A network administrator wants to implement an authentication process for temporary access to an organization's network. Which of the following technologies would facilitate this process?
A. captive portal
A Wi-Fi network implementation used in some public facilities that directs attempts to connect to the network to an internal Web page for that facility; generally used to force terms of service on users.
A captive portal is a web page that users see before accessing a public network. Users typically need to provide some form of authentication, such as logging in with temporary credentials, before they can access the network. This is particularly useful for temporary access as it can be used to enforce network access policies and gather user information.
The correct answer is A: Captive portal.
Captive portals are specifically designed for temporary access management.
The other options are less suitable because:
Enterprise authentication (B): This is more suited for permanent employees and requires complex setup
Ad hoc network (C): This refers to a temporary network structure, not an authentication method
WPA3 (D): This is an encryption standard for securing wireless networks, not specifically for managing temporary access
upvoted 3 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
HeatSquad77
1 week agofavouralain
1 month, 1 week agochrys
1 month, 4 weeks agochupapi_001
2 months, 1 week ago