Which of the following network access security methods involves the analysis of a physical hardware addresses?
A. IP filtering
B. L2TP
C. MAC filtering
D. RAS
Answer: C. MAC filtering
Computer Science & Information Technology
You might also like to view...
The formal process of deciding which fields should be grouped together into which fields is called ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
A ____ is a memory location whose value cannot change while the application is running.
A. named constant B. variable C. predefined variable D. touched variable
Computer Science & Information Technology