One type of security for wireless networks involves entering a list of the MAC addresses for the devices that are allowed to access the network and excluding all others. This is called MAC ____________.
Fill in the blank(s) with the appropriate word(s).
filtering
You might also like to view...
Which of the following is NOT true about Parvati's web search?
A. The more descriptive the search text, the easier it will be to locate the desired search results. B. The search engine may provide search text suggestions as she types. C. To display the website of the search result, click it in the list. D. She will enter the desired search text in the Query box.
What is the purpose of an emergency action plan?
What will be an ideal response?
When checking a host's IPv4 settings, which step should follow verification of the subnet mask used by the router and host?
A) Check the host's list of DNS server addresses against the actual addresses by the servers. B) Check the host's default router settings against the router's LAN interface configuration. C) Check the subnet mask used by the router and the host. D) Confirm the host and router are in the same subnet as the one implied by the ip address command.
The view in which all of the slides in your presentation display in miniature is:
What will be an ideal response?