Sarah, an IT administrator, notices that several unauthorized devices have been connecting to the company's wireless network. To ensure only company devices can connect, she considers implementing a security measure based on hardware addresses. Which security measure is she thinking of?
- MAC (Media Access Control) Filtering
- SSID Hiding
- WEP (Wired Equivalent Privacy)
- WPA3 (Wi-Fi Protected Access 3)
Sarah is considering implementing MAC (Media Access Control) filtering to control which devices can connect to the wireless network. It allows her to permit or deny devices based on their unique hardware addresses.
Loading...
Related Quiz
- Patch _______ is the process of deciding which patches should be applied to systems and in what order.
- What term describes the GDPR requirement for organizations to design data protection into their products and processes from the outset?
- Which type of IDS analyzes network traffic patterns and compares them with known attack signatures?
- What is the primary purpose of a strong password policy in user authentication?
- In a PKI (Public Key Infrastructure) system, the private key is used to _______ a message, while the public key is used to _______ it.