Ann a security administrator wants a limit access to the wireless network. Which of the following can be used to do this without using certificates?

A. Employ EPA-TLS
B. Employ PEAP on all laptops
C. Enable MAC filtering
D. Disable SSID broadcasting


Answer: C. Enable MAC filtering

Computer Science & Information Technology

You might also like to view...

What is Document flow?

What will be an ideal response?

Computer Science & Information Technology

Templates come installed with Microsoft Office 2007 and are available at the online Microsoft Office site

Indicate whether the statement is true or false

Computer Science & Information Technology

Data can be consolidated from different workbooks in one worksheet.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

With the ________________, you can create line shapes, arrows, hollow lines, and dotted lines with various dash and gap settings.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology