Susan is setting up the network for a local coffee house and wants to ensure that users have to authenticate using an email address and agree to the coffee house's acceptable use policy before being allowed on the network. What technology should she use to do this?

A. 802.11
B. NAC
C. A captive portal
D. A wireless gateway

Answer: C. A captive portal

Computer Science & Information Technology

You might also like to view...

XML stands for ________

A) Expendable Marketing Language B) Expendable Markup Language C) Extensible Markup Language D) Extensible Marketing Language

Computer Science & Information Technology

Which of the following is a flaw or weakness that allows an attacker to bypass security?

A. exploiting B. vulnerability C. threat agent D. risk

Computer Science & Information Technology