Guest WiFi Authentication: Best Option for Username and Password | N10-007 Exam

Captive Portal

Prev Question Next Question

Question

A network administrator wants to employ a username and password authentication system for guest WiFi.

Which of the following is the BEST option to provide this type of authentication?

A.

Port security B.

MAC filtering C.

Network access control D.

Captive portal.

D.

Explanations

A network administrator wants to employ a username and password authentication system for guest WiFi.

Which of the following is the BEST option to provide this type of authentication?

A.

Port security

B.

MAC filtering

C.

Network access control

D.

Captive portal.

D.

The best option to provide username and password authentication system for guest WiFi is a Captive Portal (Option D).

A Captive Portal is a web page that requires users to enter credentials or agree to terms of service before accessing the network. It is a popular method of providing secure guest access to WiFi networks.

Port security (Option A) is a feature that allows network administrators to restrict access to a network switch port based on the physical address of the device connected to it. However, this feature is not suitable for providing username and password authentication for guest WiFi.

MAC filtering (Option B) is a security feature that allows or blocks network traffic based on the MAC address of the device. While MAC filtering can help secure a network, it is not suitable for providing username and password authentication for guest WiFi.

Network Access Control (Option C) is a security solution that enforces security policies on devices seeking to access a network. It typically involves a combination of hardware and software solutions, such as authentication and authorization protocols. However, implementing a network access control solution for guest WiFi can be complex and expensive.

In conclusion, a Captive Portal is the best option for providing username and password authentication for guest WiFi, as it is simple to implement, cost-effective, and provides a secure method of access control.