Enabling MAC address filtering on a switch can be used to mitigate which of the following security threats?

A. Rogue access points
B. Viruses
C. Social engineering
D. Worms


Answer: A. Rogue access points

Computer Science & Information Technology

You might also like to view...

A class can be used to create an instance of the class called a(n) ________.

a) child b) part c) offspring d) object

Computer Science & Information Technology

Most new Android devices are shipping with what version of Android?

A. Froyo B. Gingerbread C. KitKat D. Lollipop

Computer Science & Information Technology

What is the name of the line of text that displays at the top of a newsletter?

A) Masthead B) Page Header C) Report Header D) Heading

Computer Science & Information Technology

An advantage to naming a range of cells is that you can use the name in a:

A) lookup table. B) table array. C) formula. D) data table.

Computer Science & Information Technology