32.1k views
5 votes
Miriam is a network administrator. She would like to use a wireless authentication technology similar to that found in hotels where users are redirected to a webpage when they connect to the network. What technology should she deploy? a. Protected extensible authentication protocol (peap) b. Lightweight extensible authentication protocol (leap) c. Captive portal d. Remote authentication dial-in user service (radius)

1 Answer

3 votes

Answer:

c. Captive portal

Step-by-step explanation:

A captive portal is a Web page that the user of a public-access network is obliged to view and interact with before access is granted. Captive portals are typically used by business centers, airports, hotel lobbies, coffee shops, and other venues.

User Dentrax
by
4.8k points