A network technician is setting up a segmented network that will utilize a separate ISP to provide wireless access to the public area for a company.
Which of the following wireless security methods should the technician implement to provide basic accountability for access to the public network?
Click on the arrows to vote for the correct answer
A. B. C. D.D.
The wireless security method that the network technician should implement to provide basic accountability for access to the public network is a Captive Portal (D).
A captive portal is a web page that is presented to a user before they can access the internet through a wireless network. The user must agree to the terms and conditions of use before gaining access to the network. Captive portals are often used in public Wi-Fi hotspots, hotels, and airports.
A captive portal can be configured to require a user to enter a username and password, or they can be configured to accept other forms of authentication, such as social media accounts or email addresses. By requiring authentication, the captive portal can provide basic accountability for access to the public network.
Pre-shared key (A) and Wi-Fi Protected Setup (C) are methods used to secure Wi-Fi networks, but they do not provide accountability for access to the public network. Pre-shared key is a shared password that is used to authenticate users, and Wi-Fi Protected Setup is a method used to simplify the process of configuring a secure wireless network.
Enterprise (B) is a security method used in larger organizations that require centralized authentication and management of user accounts. It is not a suitable solution for a public Wi-Fi network.