A network administrator is considering implementation of network access restrictions based upon layer two addressing information. Which of the following describes this method of network restrictions?
A. MAC filtering
B. Port filtering
C. IP filtering
D. ACL filtering