A technician sees suspicious traffic coming from a computer connected to a WAP. Which of the following can be used to stop this traffic while troubleshooting the problem?
A. tracert
B. QoS
C. ipconfig
D. MAC filtering
A technician sees suspicious traffic coming from a computer connected to a WAP. Which of the following can be used to stop this traffic while troubleshooting the problem?
A. tracert
B. QoS
C. ipconfig
D. MAC filtering