Which of the following access control methods allows or blocks devices based on MAC addresses?
A. Port security
B. ACL
C. Host IDS
D. Network IDS
Which of the following access control methods allows or blocks devices based on MAC addresses?
A. Port security
B. ACL
C. Host IDS
D. Network IDS