Which of the following network access security methods involves the analysis of a physical hardware addresses?

A. IP filtering
B. L2TP
C. MAC filtering
D. RAS

Answer: C. MAC filtering

Computer Science & Information Technology

You might also like to view...

The formal process of deciding which fields should be grouped together into which fields is called ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

A ____ is a memory location whose value cannot change while the application is running.

A. named constant B. variable C. predefined variable D. touched variable

Computer Science & Information Technology