A wireless network technician for a local retail store is installing encrypted access points within the store for real-time inventory verification, as well as remote price checking capabilities, while employees are away from the registers. The store is in a fully occupied strip mall that has multiple neighbors allowing guest access to the wireless networks. There are a finite known number of approved handheld devices needing to access the store's wireless network. Which of the following is the BEST security method to implement on the access points?

A. Port forwarding
B. MAC filtering
C. TLS/TTLS
D. IP ACL


Answer: B. MAC filtering

Computer Science & Information Technology

You might also like to view...

When deriving a class from a base class with public inheritance, public members of the base class become _______ members of the derived class, and protected members of the base class become ______ members of the derived class.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The DataTable object can be used to access individual fields within a database by using the ____ procedure.

A. Field B. Fields C. Row D. Rows

Computer Science & Information Technology

Which technology employs sockets to map internal private network addresses to a public address using one-to-many mapping?

A. network-address translation B. screened-subnet firewall C. port-address translation D. private address mapping

Computer Science & Information Technology

A Windows tool that can be used for checking application and system logs for errors

What will be an ideal response?

Computer Science & Information Technology