Enabling MAC address filtering on a switch can be used to mitigate which of the following security threats?
A. Rogue access points
B. Viruses
C. Social engineering
D. Worms
Answer: A. Rogue access points
Computer Science & Information Technology
You might also like to view...
Programmers say that data items are ____ only after they have been declared and within the method in which they are declared.
A. available B. identified C. visible D. useable
Computer Science & Information Technology
Routers are the bridge between wired and wireless networks.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology