Which of the following methods limits access to a network based on characteristics of the network card?

A. IP filtering
B. MAC filtering
C. Port filtering
D. Encryption


Answer: B. MAC filtering

Computer Science & Information Technology

You might also like to view...

Case-Based Critical Thinking QuestionsCase 2As Dan creates a new table for the database he is building to track the budget for his small business, he is struck by how many different data types he will be using. He turns to his friend Giovanni for a quick refresher on each of the data types and which one is most appropriate for a particular need. Which data type does Giovanni suggest that Dan use when he is adding a field to record the cost of a particular service rendered?

A. Monetary B. Currency C. Number D. AutoNumber

Computer Science & Information Technology

_____________ code is used in HTML5 Canvas documents. 

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Suppose that you can find a small subset of points S , from the original data set, such that every point in the data set is within a specified distance ? of at least one of the points in S , and that you also have the pairwise distance matrix for S . Describe a technique that uses this information to compute, with a minimum of distance calculations, the set of all points within a distance of ? of a specified point from the data set.

You are given a set of points S in Euclidean space, as well as the distance of each point in S to a point x. (It does not matter if x ? S.)

Computer Science & Information Technology

The first and getNext functions (the iterator) cannot be used in the remove function to find the node to remove because:

A. a class function cannot call any other class functions B. they aren’t called directly by the client, so they don’t know what to search for C. the first and getNext functions just return the elements within nodes, and the remove function needs to know the address of the node to remove D. it would be impossible to return the element using the reference parameter

Computer Science & Information Technology