Wireless Access Point Configuration for Coffee Shop Customers

Deploying a Wireless Access Point for Coffee Shop Customers

Prev Question Next Question

Question

A technician is setting up a wireless access point in a coffee shop.

The shop is not concerned with security but only wants to allow customers to have access.

Which of the following configurations should the technician deploy?

A.

Use a pre-shared key. B.

Set up EAP. C.

Configure RADIUS. D.

Configure MAC filtering.

A.

Explanations

A technician is setting up a wireless access point in a coffee shop.

The shop is not concerned with security but only wants to allow customers to have access.

Which of the following configurations should the technician deploy?

A.

Use a pre-shared key.

B.

Set up EAP.

C.

Configure RADIUS.

D.

Configure MAC filtering.

A.

The appropriate configuration to allow customers to have wireless access in a coffee shop, without being concerned with security, would be to use a pre-shared key. Therefore, option A is the correct answer.

A pre-shared key (PSK) is a passphrase that is used to authenticate wireless clients to an access point. It is a simple method of securing wireless networks that does not require extensive configuration. With a PSK, all users have the same passphrase to access the network. Although it is not the most secure method of wireless security, it is sufficient for small networks that do not require high levels of security.

Option B, setting up EAP (Extensible Authentication Protocol), is a method of authentication that uses digital certificates and a public key infrastructure (PKI) to provide more secure wireless network access. It is typically used in enterprise networks where security is a high priority.

Option C, configuring RADIUS (Remote Authentication Dial-In User Service), is a network protocol that provides centralized authentication, authorization, and accounting for wireless network access. It is a more complex and secure method of wireless network authentication, typically used in enterprise networks.

Option D, configuring MAC (Media Access Control) filtering, is a method of restricting access to a wireless network by allowing only devices with specific MAC addresses to connect. Although MAC filtering can provide some additional security, it is not a reliable method of securing wireless networks, as MAC addresses can be easily spoofed.

In summary, for a coffee shop that is not concerned with security but only wants to allow customers to have access, a pre-shared key is the most appropriate configuration for the wireless access point.