Ann a security administrator wants a limit access to the wireless network. Which of the following can be used to do this without using certificates?

A. Employ EPA-TLS
B. Employ PEAP on all laptops
C. Enable MAC filtering
D. Disable SSID broadcasting

Answer: C. Enable MAC filtering

Computer Science & Information Technology

You might also like to view...

With nested queries, aggregate functions may be used because each record in the first query will probably be unique

Indicate whether the statement is true or false

Computer Science & Information Technology

A record is displayed in a row of a database table

Indicate whether the statement is true or false

Computer Science & Information Technology