Sara, an IT Administrator, wants to make sure that only certain devices can connect to the wireless network. Which of the following can she implement to accomplish this task?

A. MAC filtering
B. Increase the power levels of the WAP
C. Dynamic DHCP
D. Disable SSID broadcast


Answer: A. MAC filtering

Computer Science & Information Technology

You might also like to view...

A __________ is a part of a method that contains a collection of statements that are performed when the method is executed.

a. method header b. return type c. method body d. method modifier

Computer Science & Information Technology

What are the three areas defined for the IEEE 802.11 standard?

What will be an ideal response?

Computer Science & Information Technology

Write a line comment and block comment for the following line of code identifying the author, date, and purpose of the method. In addition, explain the difference between comments that consist of a double-slash (//) and those that have a starting and ending slash asterisk (/* .. */). ? System.out.println("Hello Students");

What will be an ideal response?

Computer Science & Information Technology

Border, Smooth, and Expand are three commands that are located on the ____________________ command submenu.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology