Which of the following options is a functionality or tool that disallows access to a wireless network based on the layer 2 address of the client device?
Attacks, Threats, and Vulnerabilities | |
Architecture and Design | |
Implementation | |
Operations and Incident Response | |
Governance, Risk, and Compliance |