Enabling MAC address filtering on a switch can be used to mitigate which of the following security threats?

A. Rogue access points
B. Viruses
C. Social engineering
D. Worms

Answer: A. Rogue access points

Computer Science & Information Technology

You might also like to view...

Programmers say that data items are ____ only after they have been declared and within the method in which they are declared.

A. available B. identified C. visible D. useable

Computer Science & Information Technology

Routers are the bridge between wired and wireless networks.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology