A technician is setting up a public guest network for visitors to access the Internet that must be separate from the corporate network.
Which of the following are the BEST steps for the technician to take with minimum overhead configuration? (Choose two.)
A.
Enable SSID broadcasting to identify the guest network B.
Configure visitor devices to use static IP addresses C.
Enable two-factor authentication on visitor devices D.
Configure the access point to use WPA2-AES encryption E.
Ensure the access point is not running in mixed mode.
AB.
A technician is setting up a public guest network for visitors to access the Internet that must be separate from the corporate network.
Which of the following are the BEST steps for the technician to take with minimum overhead configuration? (Choose two.)
A.
Enable SSID broadcasting to identify the guest network
B.
Configure visitor devices to use static IP addresses
C.
Enable two-factor authentication on visitor devices
D.
Configure the access point to use WPA2-AES encryption
E.
Ensure the access point is not running in mixed mode.
AB.
Option A - Enable SSID broadcasting to identify the guest network: This option is a good step to take because it allows visitors to easily identify the guest network and connect to it. By enabling SSID broadcasting, the network name will be visible to all nearby devices, making it easier for visitors to connect. This step is a good practice and it is recommended to implement this option for the guest network.
Option B - Configure visitor devices to use static IP addresses: This option is not a good step to take as it will require additional overhead configuration for each device that connects to the guest network. It is better to use DHCP (Dynamic Host Configuration Protocol) to automatically assign IP addresses to the devices that connect to the network. This will save time and effort and reduce the risk of configuration errors.
Option C - Enable two-factor authentication on visitor devices: This option is not relevant to the scenario since it is not common to require visitors to use two-factor authentication to access a guest network. Two-factor authentication is typically used for more sensitive networks where higher security is required.
Option D - Configure the access point to use WPA2-AES encryption: This option is a good step to take since it will help ensure that the guest network is secure. WPA2-AES encryption is currently the most secure wireless encryption standard available and is recommended for all wireless networks.
Option E - Ensure the access point is not running in mixed mode: This option is a good step to take since running the access point in mixed mode can increase the risk of security vulnerabilities. It is recommended to use a single wireless mode (either 802.11g or 802.11n) to reduce the risk of security vulnerabilities.
Overall, the BEST steps for the technician to take with minimum overhead configuration are: