Ask Question
30 April, 16:07

A network engineer is configuring wireless access for guests at an organization. Access to other areas in the organization should not be accessible to guests. Which of the following represents the MOST secure method to configure guest access to the wireless network?

A. Guests should log into a separate wireless network using a captive portal

B. Guests should log into the current wireless network using credentials obtained upon entering the facility

C. The existing wireless network should be configured to allow guest access

D. An additional wireless network should be configured to allow guest access

+5
Answers (1)
  1. 30 April, 16:14
    0
    Answer: (A) Guests should log into a separate wireless network using a captive portal

    Explanation:

    As the network engineer is configuring a wireless access and it does not want the guest access to other areas in the organization so in order to check that a separate wireless network should be there and the guest are to log into that network. Upon logging into that there should be a captive portal through which they could access the internet.

    Using the captive portal which is a web page asking for the guest its username and password the organisation is able to keep tack of the sites the guest visits and on its activities. More over having a captive portal ensure the organization that they are authorized guest to access the site.

    This captive portal also hides access to certain areas of the organisation which the admin does not want. So altogether in this way it is the most secure method to configure guest access to wireless network.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question 👍 “A network engineer is configuring wireless access for guests at an organization. Access to other areas in the organization should not be ...” in 📗 Computers & Technology if the answers seem to be not correct or there’s no answer. Try a smart search to find answers to similar questions.
Search for Other Answers