A network technician is setting up a segmented network that will utilize a separate ISP to provide wireless access to the public area for a company. Which of the following wireless security methods should the technician implement to provide basic accountability for access to the public network?

A. Pre-shared key
B. Enterprise
C. Wi-Fi Protected setup
D. Captive portal


Answer: D. Captive portal

Computer Science & Information Technology

You might also like to view...

A thread gains access to a resource with a nonempty discretionary access control list (DACL) if ________.

a) the first ACE (access control entry) in the resource's DACL that matches one of the SIDs in the thread's access token grants that security principal access to the resource b) no ACE in the resource's DACL denies access to any of the SIDs in the thread's access token c) one of the ACEs in the resource's DACL that matches one of the SIDs in the thread's access token grants that security principal access to the resource d) for each SID in the thread's access token, there is an ACE in the resource's DACL that grants access to the resource

Computer Science & Information Technology

(string Concatenation) Write a program that separately inputs a first name and a last name and concatenates the two into a new string.

What will be an ideal response?

Computer Science & Information Technology

In the Find and Replace dialog box, clicking the ________ button replaces all instances of a word or phrase at one time

Fill in the blank(s) with correct word

Computer Science & Information Technology

DNS is a protocol that automatically provides a computer with its IP address configuration.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology