Which of the following is a method for limiting access to your wireless network based on the physical addresses of wireless NICs?

A. 802.1X
B. WEP
C. MAC address filtering
D. WPA


Answer: C

Computer Science & Information Technology

You might also like to view...

For the program in Fig. 5.34, state the scope (either function scope, global namespace scope, local scope or function-prototype scope) of each of the following elements:

``` #include using namespace std; int cube( int y ); // function prototype int main() { int x; for ( x = 1; x <= 10; x++ ) // loop 10 times cout << cube( x ) << endl; // calculate cube of x and output results } // end main // definition of function cube int cube( int y ) { return y * y * y; } // end function cube ``` a) The variable x in main. b) The variable y in cube. c) The function cube. d) The function main. e) The function prototype for cube. f) The identifier y in the function prototype for cube.

Computer Science & Information Technology

In ________, Google announced it had indexed over one billion pages

A) 2004 B) 2001 C) 2003 D) 2000

Computer Science & Information Technology

When copying information from Excel and pasting it into PowerPoint, you can keep only the text and eliminate the worksheet grid

Indicate whether the statement is true or false

Computer Science & Information Technology

If a company is using a previous version of Excel without Power Pivot, they can use Conditional Formatting ________ instead to indicate proximity to various KPI goals

A) Data Bars B) Color Scales C) Icon Sets D) Highlight Cells Rules

Computer Science & Information Technology