A network engineer is configuring wireless access for guests at an organization. Access to other areas in the organization should not be accessible to guests. Which of the following represents the MOST secure method to configure guest access to the wireless network?

A. Guests should log into a separate wireless network using a captive portal
B. Guests should log into the current wireless network using credentials obtained upon entering the facility
C. The existing wireless network should be configured to allow guest access
D. An additional wireless network should be configured to allow guest access

Answer: A. Guests should log into a separate wireless network using a captive portal

Computer Science & Information Technology

You might also like to view...

The word Figure below an image is the ________, which is the uniform text that displays before the caption number and descriptive text

A) image identifier B) caption label C) table of contents index D) table of figures index

Computer Science & Information Technology

Standard Windows NTFS permissions for a folder are: full control, modify, read & execute, list folder contents, __________, and _____________.

a. delete b. read c. write d. export

Computer Science & Information Technology