______________ is a handy way of creating a type of ?accepted users? list to limit access to your wireless network.

Fill in the blank(s) with the appropriate word(s).


MAC address filtering

correct

Computer Science & Information Technology

You might also like to view...

When visiting Web pages that you want to remember and you are using Internet Explorer, you can add the link to your ________ list

A) Search B) History C) Bookmarked D) Favorites

Computer Science & Information Technology

A range name:

A) indicates a cell's relative location from the cell containing the formula. B) is a word or a string of characters that represent one or more cells. C) always begins with an equal sign (=). D) indicates a cell's specific location and the reference does not change when you copy the formula.

Computer Science & Information Technology

IP hijacking is one of the largest Internet security threats.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

One of the major functions of an information system is to help people make decisions in response to problems.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology