A network engineer is configuring wireless access for guests at an organization.
Access to other areas in the organization should not be accessible to guests.
Which of the following represents the MOST secure method to configure guest access to the wireless network?
A.
Guests should log into a separate wireless network using a captive portal B.
Guests should log into the current wireless network using credentials obtained upon entering the facility C.
The existing wireless network should be configured to allow guest access D.
An additional wireless network should be configured to allow guest access.
A.
A network engineer is configuring wireless access for guests at an organization.
Access to other areas in the organization should not be accessible to guests.
Which of the following represents the MOST secure method to configure guest access to the wireless network?
A.
Guests should log into a separate wireless network using a captive portal
B.
Guests should log into the current wireless network using credentials obtained upon entering the facility
C.
The existing wireless network should be configured to allow guest access
D.
An additional wireless network should be configured to allow guest access.
A.
The MOST secure method to configure guest access to the wireless network is to have guests log into a separate wireless network using a captive portal.
A captive portal is a web page that is presented to the user when they first connect to the wireless network. The user must enter their login credentials or agree to terms of use before being granted access to the network. This provides an additional layer of security by preventing unauthorized access to the network.
Option B, guests logging into the current wireless network using credentials obtained upon entering the facility, is not as secure because it relies on the assumption that the guest credentials will not be shared with unauthorized individuals.
Option C, configuring the existing wireless network to allow guest access, may compromise the security of the network by allowing guests to access resources that should only be available to authorized users.
Option D, configuring an additional wireless network for guest access, may also compromise security if the network is not properly isolated from the organization's internal network.
Therefore, option A is the most secure method to configure guest access to the wireless network.