A network administrator is securing the wireless network in a multitenant building.
The network uses a passphrase for authentication so it is easy to allow guests onto the wireless network, but management would like to prevent users from outside the office space from accessing the network.
Which of the following security mechanisms would BEST meet this requirement?
A.
MAC filtering B.
WPA-PSK C.
802.1X D.
Geofencing.
D.
A network administrator is securing the wireless network in a multitenant building.
The network uses a passphrase for authentication so it is easy to allow guests onto the wireless network, but management would like to prevent users from outside the office space from accessing the network.
Which of the following security mechanisms would BEST meet this requirement?
A.
MAC filtering
B.
WPA-PSK
C.
802.1X
D.
Geofencing.
D.
The BEST security mechanism to meet the requirement of preventing unauthorized access to the wireless network in a multitenant building is geofencing.
Geofencing is a technique that uses GPS or RFID technology to create a virtual boundary around a physical location. It allows network administrators to define a geographic area where the wireless network is accessible, thereby restricting access to only authorized users within that boundary.
In this scenario, the use of a passphrase for authentication makes it easy for guests to access the network, but it also makes it easier for unauthorized users outside of the office space to access the network. Implementing geofencing would limit network access to only users within the defined boundary, thus preventing unauthorized access.
MAC filtering is another security mechanism that can be used to limit network access based on the physical address of a device's network interface. However, MAC addresses can be spoofed, making this mechanism less secure than geofencing.
WPA-PSK is a security protocol that uses a pre-shared key for authentication. While this can provide some level of security, it does not provide any restrictions based on location.
802.1X is a security protocol that provides port-based authentication for wired and wireless networks. While this can provide a high level of security, it is typically used in enterprise-level networks and may be more complex to implement than geofencing in a multitenant building scenario.