For this kind of visitor scenario, which of the following authentication methods is generally recommended?

When a visitor comes to the enterprise, while facilitating visitor access, it is necessary to control the visitor’s access behavior.

For this kind of visitor scenario, which of the following authentication methods is generally recommended?
A . MAC bypass authentication
B . Portal authentication
C . 802.1X authentication
D . MAC authentication

Answer: B

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments