You and the network access team are discussing how to control access to the network. While one team member suggests using a captive SSL portal, others are in favor of using 802.1x with a RADIUS server. Why would the later suggestion be better?
A. A captive SSL portal may be exploitable with a simple packet sniffer.
B. The portal cannot display an AUP.
C. SSL cannot encrypt the transmissions.
D. 802.1x's ability to be applied to open Ethernet jacks.
A
Explanation: In some implementations of an SSL captive portal, once the device is granted access the MAC address or IP address of the device is then allowed to bypass the captive portal. Using a sniffer a hacker could learn the MAC or IP address of an authenticated device, spoof the address and gain entry.
You might also like to view...
A footnote is a reference placed at the bottom of the page and contains a number reference
Indicate whether the statement is true or false
The Portable Operating System Interface (POSIX) is an example of a(n):
a) GUI b) API c) protocol suite d) device driver
To assist in footprint intelligence collection, attackers may use an enhanced Web scanner that, among other things, can scan entire Web sites for valuable pieces of information, such as server names and e-mail addresses.
Answer the following statement true (T) or false (F)
If you add two 20-page documents to the Book panel, the second document in the panel will be paginated from what to what?
A. 20-40 B. 21-40 C. 21-41 D. 1-20