A company wishes to allow employees with company-owned mobile devices to connect automatically to the corporate wireless network upon entering the facility.
Which of the following would BEST accomplish this objective?
A.
Open wireless B.
Geofencing C.
Pre-shared key D.
MAC filtering.
C.
A company wishes to allow employees with company-owned mobile devices to connect automatically to the corporate wireless network upon entering the facility.
Which of the following would BEST accomplish this objective?
A.
Open wireless
B.
Geofencing
C.
Pre-shared key
D.
MAC filtering.
C.
Option C, pre-shared key, would be the best option to accomplish the objective of allowing employees with company-owned mobile devices to connect automatically to the corporate wireless network upon entering the facility.
Pre-shared key (PSK) is a form of authentication method that is commonly used in wireless networks. In PSK, a shared password or key is used to authenticate and encrypt data that is transmitted between wireless devices and the wireless access point. This method is considered to be secure and reliable, as long as the password is kept confidential and is changed frequently.
With PSK, the company can configure their wireless access point to store the shared key, and configure their employees' mobile devices to use the same shared key. As long as the mobile device is within range of the wireless access point and the shared key is correctly entered, the device will automatically connect to the corporate wireless network.
The other options presented in the question are not as suitable for this scenario.
Option A, open wireless, is not secure and would allow any device to connect to the wireless network without any authentication. This could potentially put the company's network at risk.
Option B, geofencing, is a method of creating a virtual boundary around a physical location and using it to trigger a specific action, such as sending a notification or activating a device. While geofencing can be used to trigger the automatic connection of a mobile device to a wireless network, it may not be accurate enough to ensure that the device is within the corporate facility and could result in unauthorized access.
Option D, MAC filtering, is a method of restricting access to a wireless network based on the MAC address of the device. While this method can be effective in preventing unauthorized access, it can also be easily bypassed by attackers who can spoof their MAC address to gain access to the network. Additionally, managing a list of authorized MAC addresses can be time-consuming and difficult to maintain for a large number of devices.