Which of the following network access security methods involves the analysis of a physical hardware addresses?
A. IP filtering
B. L2TP
C. MAC filtering
D. RAS
Answer: C. MAC filtering
You might also like to view...
Stream reduction operation ________ uses the elements of a collection to produce a single value using an associative accumulation function (e.g., a lambda that adds two elements).
a. reduce b. condense c. combine d. associate
A key can be a(n) ________ key that is nonnaturally occurring data that is visible to the user, such as sequential numbering from the AutoNumber data type
Fill in the blank(s) with correct word
Structured programming is most often characterized by the GOTO statement, common in early line-number BASIC programs.
Answer the following statement true (T) or false (F)
Before installing a wireless network, you should prepare by performing what task?
A) Site survey B) Calibrate the antenna C) Response test by the wireless clients D) Authentication test on the access point