A security administrator is responsible for ensuring that there are no unauthorized devices utilizing the corporate network. During a routine scan, the security administrator discovers an unauthorized device belonging to a user in the marketing department. The user is using an android phone in order to browse websites. Which of the following device attributes was used to determine that the device was unauthorized?
A. An IMEI address
B. A phone number
C. A MAC address
D. An asset ID
Answer: C. A MAC address
Computer Science & Information Technology
You might also like to view...
The Sound Byte uses the term all-in-one system to describe a type of ________ computer
A) laptop B) netbook C) desktop D) ultrabook
Computer Science & Information Technology
Files deleted from a flash drive are sent to the Recycle Bin and could be recovered, if necessary
Indicate whether the statement is true or false
Computer Science & Information Technology
The Total row of a table is a record
Indicate whether the statement is true or false
Computer Science & Information Technology
Which method returns a collection of references to all instances of a certain element in an HTML document??
A. ?getElementById() B. ?getElementsByName() C. ?getElementsByTagName() D. ?getElementsByClassName()
Computer Science & Information Technology