A security administrator is responsible for ensuring that there are no unauthorized devices utilizing the corporate network. During a routine scan, the security administrator discovers an unauthorized device belonging to a user in the marketing department. The user is using an android phone in order to browse websites. Which of the following device attributes was used to determine that the device was unauthorized?
A. An IMEI address
B. A phone number
C. A MAC address
D. An asset ID
Answer: C. A MAC address
Computer Science & Information Technology
You might also like to view...
The pv argument in the future value function corresponds to one time investments made into an account
Indicate whether the statement is true or false
Computer Science & Information Technology
By using the ________, you can divide the table created from an imported Excel spreadsheet into several tables as well as automatically create the relationships needed between them
A) Import Wizard B) Expression Builder C) Lookup Field Wizard D) Table Analyzer Wizard
Computer Science & Information Technology