Which of the following access control methods allows or blocks devices based on MAC addresses?
A. Port security
B. ACL
C. Host IDS
D. Network IDS
Answer: A. Port security
You might also like to view...
The most general class in a class hierarchy is placed at the bottom of the hierarchy.
Answer the following statement true (T) or false (F)
Given that you have a file with the internal name Books which contains twenty records, with three fields per record (title, author, publication year), how many passes will be executed in the following loop?
```While NOT EOF(Books) Read Books, Title, Author, Year End While``` a. 1 b. 3 c. 20 d. 21
If you make a mistake while creating a mask, you can press the ____ key on the keyboard to toggle to the default foreground color and paint to unmask the error.
a. X b. E c. right bracket ( ] ) d. +
Describe 802.1x authentication.
What will be an ideal response?