Which of the following access control methods allows or blocks devices based on MAC addresses?
A. Port security
B. ACL
C. Host IDS
D. Network IDS
Which of the following access control methods allows or blocks devices based on MAC addresses?
A. Port security
B. ACL
C. Host IDS
D. Network IDS
You must be logged in to post a comment.