Site icon Exam4Training

For this kind of visitor scenario, which of the following authentication methods is generally recommended?

When a visitor comes to the enterprise, while facilitating visitor access, it is necessary to control the visitor’s access behavior.

For this kind of visitor scenario, which of the following authentication methods is generally recommended?
A . MAC bypass authentication
B . Portal authentication
C . 802.1X authentication
D . MAC authentication

Answer: B

Exit mobile version