Enabling MAC address filtering on a switch can be used to mitigate which of the following security threats?
A. Rogue access points
B. Viruses
C. Social engineering
D. Worms
Answer: A. Rogue access points
Computer Science & Information Technology
You might also like to view...
A class can be used to create an instance of the class called a(n) ________.
a) child b) part c) offspring d) object
Computer Science & Information Technology
Most new Android devices are shipping with what version of Android?
A. Froyo B. Gingerbread C. KitKat D. Lollipop
Computer Science & Information Technology
What is the name of the line of text that displays at the top of a newsletter?
A) Masthead B) Page Header C) Report Header D) Heading
Computer Science & Information Technology
An advantage to naming a range of cells is that you can use the name in a:
A) lookup table. B) table array. C) formula. D) data table.
Computer Science & Information Technology