List of questions
Related questions
Question 622 - N10-008 discussion
An organization has a security requirement that all network connections can be traced back to a user. A network administrator needs to identify a solution to implement on the wireless network. Which of the following is the best solution?
A.
Implementing enterprise authentication
B.
Requiring the use of PSKs
C.
Configuring a captive portal for users
D.
Enforcing wired equivalent protection
Your answer:
0 comments
Sorted by
Leave a comment first