Which of the following options is a functionality or tool that disallows access to a wireless network based on the layer 2 address of the client device?
Threats, Attacks and Vulnerabilities | |
Technologies and Tools | |
Architecture and Design | |
Identity and Access Management | |
Risk Management | |
Cryptography and PKI |