Ann a security administrator wants a limit access to the wireless network. Which of the following can be used to do this without using certificates?
A. Employ EPA-TLS
B. Employ PEAP on all laptops
C. Enable MAC filtering
D. Disable SSID broadcasting
Answer: C. Enable MAC filtering
Computer Science & Information Technology
You might also like to view...
What is Document flow?
What will be an ideal response?
Computer Science & Information Technology
Templates come installed with Microsoft Office 2007 and are available at the online Microsoft Office site
Indicate whether the statement is true or false
Computer Science & Information Technology
Data can be consolidated from different workbooks in one worksheet.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
With the ________________, you can create line shapes, arrows, hollow lines, and dotted lines with various dash and gap settings.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology