Notifications
Clear all
Topic starter
In order to prevent hackers from attacking user devices or networks through MAC addresses, the MAC addresses of untrusted users can be configured as black hole MAC addresses to filter out illegal MAC addresses.
- A . TRUE
B. FALSE
Suggested Answer: A
Posted : 18/11/2022 7:59 pm