Susan is setting up the network for a local coffee house and wants to ensure that users have to authenticate using an email address and agree to the coffee house's acceptable use policy before being allowed on the network. What technology should she use to do this?

A. 802.11
B. NAC
C. A captive portal
D. A wireless gateway


Answer: C. A captive portal

Computer Science & Information Technology

You might also like to view...

The Click event is triggered when a form or form control receives the focus. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Excel ________ can contain text, numbers, or formulas

Fill in the blank(s) with correct word

Computer Science & Information Technology

? ?The given figure shows a _____ module, which is reusable code and can be invoked from more than one point in a structure chart.

A. ?library B. ?data C. ?subordinate D. ?control

Computer Science & Information Technology

After connecting a workstation directly to a small business firewall, a network administrator is trying to manage it via HTTPS without losing its stored configuration. The only two pieces of information that the network administrator knows about the firewall are the management interface MAC address, which is 01:4a:d1:fa:b1:0e, and the administrator's password. Which of the following will allow the administrator to log onto the firewall via HTTPS if the management's IP address is unknown and the administrator's workstation IP address is 192.168.0.10/23?

A. Use the reset button on the back of the firewall to restore it to its factory default, and then log onto B. Run the following command on the administrator's workstation: arp -s 192.168.1.200 01:4a:d1:fa:b1:0e C. Use an SNMP tool to query the firewall properties and determine the correct management IP address D. Use a crossover cable to connect to the console port and reconfigure the firewall management IP to 192.168.0.1

Computer Science & Information Technology