Susan is setting up the network for a local coffee house and wants to ensure that users have to authenticate using an email address and agree to the coffee house's acceptable use policy before being allowed on the network. What technology should she use to do this?
A. 802.11
B. NAC
C. A captive portal
D. A wireless gateway
Answer: C. A captive portal
Computer Science & Information Technology
You might also like to view...
XML stands for ________
A) Expendable Marketing Language B) Expendable Markup Language C) Extensible Markup Language D) Extensible Marketing Language
Computer Science & Information Technology
Which of the following is a flaw or weakness that allows an attacker to bypass security?
A. exploiting B. vulnerability C. threat agent D. risk
Computer Science & Information Technology