Sarah, an IT administrator, notices that several unauthorized devices have been connecting to the company's wireless network. To ensure only company devices can connect, she considers implementing a security measure based on hardware addresses. Which security measure is she thinking of?

  • MAC (Media Access Control) Filtering
  • SSID Hiding
  • WEP (Wired Equivalent Privacy)
  • WPA3 (Wi-Fi Protected Access 3)
Sarah is considering implementing MAC (Media Access Control) filtering to control which devices can connect to the wireless network. It allows her to permit or deny devices based on their unique hardware addresses.
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *