A network administrator is considering implementation of network access restrictions based upon
layer two addressing information. Which of the following describes this method of network
restrictions?
A.
MAC filtering
B.
Port filtering
C.
IP filtering
D.
ACL filtering