Ann a security administrator wants a limit access to the wireless network. Which of the following can be used to do this without using certificates?
A. Employ EPA-TLS
B. Employ PEAP on all laptops
C. Enable MAC filtering
D. Disable SSID broadcasting
Answer: C. Enable MAC filtering
Computer Science & Information Technology
You might also like to view...
With nested queries, aggregate functions may be used because each record in the first query will probably be unique
Indicate whether the statement is true or false
Computer Science & Information Technology
A record is displayed in a row of a database table
Indicate whether the statement is true or false
Computer Science & Information Technology