A company only wants preapproved laptops to be able to connect to a wireless access point. Which of the following should be configured?
A. SSID disable
B. ACL rules
C. WPA encryption
D. MAC filtering
Answer: D. MAC filtering
Computer Science & Information Technology
You might also like to view...
Which of the following is not a best practice for cryptographic key management?
A) Keys should be transmitted and stored by secure means. B) Keys should be properly destroyed when their lifetime ends. C) Keys should be presented in clear text. D) Key values should be random, and the full spectrum of the keyspace should be used.
Computer Science & Information Technology
What visual effect would result by changing the horizontal and vertical gaps on the border layout used in the LayoutDemo program? Make the change to test your answer.
What will be an ideal response?
Computer Science & Information Technology