You and the network access team are discussing how to control access to the network. While one team member suggests using a captive SSL portal, others are in favor of using 802.1x with a RADIUS server. Why would the later suggestion be better?

A. A captive SSL portal may be exploitable with a simple packet sniffer.
B. The portal cannot display an AUP.
C. SSL cannot encrypt the transmissions.
D. 802.1x's ability to be applied to open Ethernet jacks.

A
Explanation: In some implementations of an SSL captive portal, once the device is granted access the MAC address or IP address of the device is then allowed to bypass the captive portal. Using a sniffer a hacker could learn the MAC or IP address of an authenticated device, spoof the address and gain entry.

Computer Science & Information Technology

You might also like to view...

Google Wave was a social messaging tool tied closely into Google's Gmail system and was used to share messages privately or publicly

Indicate whether the statement is true or false

Computer Science & Information Technology

Tabs and commas can be used as ________ in paragraphs which allow text to be converted to multiple column tables

A) floating objects B) separator characters C) leaders D) handles

Computer Science & Information Technology