Which of the following network access security methods involves the analysis of a physical hardware addresses?
A.
IP filtering
B.
L2TP
C.
MAC filtering
D.
RAS
Which of the following network access security methods involves the analysis of a physical hardware addresses?
Which of the following network access security methods involves the analysis of a physical hardware addresses?
A.
IP filtering
B.
L2TP
C.
MAC filtering
D.
RAS