Which of the following network access security methods involves the analysis of a physical hardware addresses?

A. IP filtering
B. L2TP
C. MAC filtering
D. RAS


Answer: C. MAC filtering

Computer Science & Information Technology

You might also like to view...

Stream reduction operation ________ uses the elements of a collection to produce a single value using an associative accumulation function (e.g., a lambda that adds two elements).

a. reduce b. condense c. combine d. associate

Computer Science & Information Technology

A key can be a(n) ________ key that is nonnaturally occurring data that is visible to the user, such as sequential numbering from the AutoNumber data type

Fill in the blank(s) with correct word

Computer Science & Information Technology

Structured programming is most often characterized by the GOTO statement, common in early line-number BASIC programs.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Before installing a wireless network, you should prepare by performing what task?

A) Site survey B) Calibrate the antenna C) Response test by the wireless clients D) Authentication test on the access point

Computer Science & Information Technology