A network engineer is configuring wireless access for guests at an organization. Access to other areas in the organization should not be accessible to guests. Which of the following represents the MOST secure method to configure guest access to the wireless network?
A. Guests should log into a separate wireless network using a captive portal
B. Guests should log into the current wireless network using credentials obtained upon entering the facility
C. The existing wireless network should be configured to allow guest access
D. An additional wireless network should be configured to allow guest access
+4
Answers (1)
Know the Answer?
Not Sure About the Answer?
Find an answer to your question ✅ “A network engineer is configuring wireless access for guests at an organization. Access to other areas in the organization should not be ...” in 📘 Computers and Technology if you're in doubt about the correctness of the answers or there's no answer, then try to use the smart search and find answers to the similar questions.
Home » Computers and Technology » A network engineer is configuring wireless access for guests at an organization. Access to other areas in the organization should not be accessible to guests.