Zach, an administrator, wants to eliminate remote access to a network from all users, except those
users in Zach’s own country. Which of the following security measures could he use to set up this
functionality?
A.
MAC filtering
B.
Port filtering
C.
IP filtering
D.
TLS