To prevent unauthorized access to a wireless network, administrators can implement MAC address _______.
- Broadcasting
- Encryption
- Filtering
- Hiding
MAC address filtering allows or denies access to a network based on the unique hardware address of a device, enhancing security by controlling device access.
Loading...
Related Quiz
- In a PKI (Public Key Infrastructure) system, the private key is used to _______ a message, while the public key is used to _______ it.
- What is the primary purpose of security compliance?
- Sarah, an IT administrator, notices that several unauthorized devices have been connecting to the company's wireless network. To ensure only company devices can connect, she considers implementing a security measure based on hardware addresses. Which security measure is she thinking of?
- For secure file transfers, SFTP operates on the _______ layer, while SCP operates on the _______ layer of the OSI model.
- Emily, a system administrator, is configuring a new server. She ensures that only necessary services run, disables default accounts, and sets strong password policies. What process is Emily engaged in?