New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CWNP CWSP-207 Exam - Topic 4 Question 8 Discussion

Actual exam question for CWNP's CWSP-207 exam
Question #: 8
Topic #: 4
[All CWSP-207 Questions]

Given: The Marketing department's WLAN users need to reach their file and email server as well as the Internet, but should not have access to any other network resources.

What single WLAN security feature should be implemented to comply with these requirements?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Mary
3 months ago
Captive portal? Nah, that’s not gonna cut it here.
upvoted 0 times
...
Antione
3 months ago
Mutual authentication doesn’t seem right for this scenario.
upvoted 0 times
...
Keena
3 months ago
Wait, can we really restrict access like that? Sounds tricky.
upvoted 0 times
...
Marti
4 months ago
Totally agree, it limits access effectively.
upvoted 0 times
...
Svetlana
4 months ago
I think Role-based access control is the way to go!
upvoted 0 times
...
Antonio
4 months ago
Group authentication sounds familiar, but I feel like it doesn't really address the need for restricting access to just the file and email server.
upvoted 0 times
...
Reynalda
4 months ago
I practiced a similar question where we had to restrict access, and I think mutual authentication was more about verifying users rather than limiting access.
upvoted 0 times
...
Veronika
4 months ago
I'm not entirely sure, but I remember something about captive portals being used for guest access. That might not fit here.
upvoted 0 times
...
Wilda
5 months ago
I think role-based access control might be the right choice since it can limit users to specific resources.
upvoted 0 times
...
Hermila
5 months ago
Okay, I think I've got this. The key here is that the Marketing department users need access to specific resources, but should be restricted from everything else. Based on that, the captive portal option (B) seems like the way to go.
upvoted 0 times
...
Delsie
5 months ago
I'm a little confused by this question. There are a few options that seem relevant, like the captive portal and role-based access control. I'll need to review the details of each feature to determine the single best solution.
upvoted 0 times
...
Dwight
5 months ago
Ah, this is a good one. I'm pretty confident the answer is B - captive portal. That would allow the Marketing department users to access the file/email server and internet, while preventing access to other network resources.
upvoted 0 times
...
Tracey
5 months ago
This seems like a straightforward question about WLAN security features. I think the captive portal option is the best choice here to restrict access to only the necessary resources.
upvoted 0 times
...
Carla
5 months ago
Hmm, I'm a bit unsure about this one. I'll need to think it through carefully. The role-based access control option seems promising, but I'm not 100% sure if that's the single best solution for this scenario.
upvoted 0 times
...
Joanna
5 months ago
Hmm, this is a tricky one. I'm not entirely sure about the differences between management and protocol traffic. I'll have to review my notes and try to recall the key characteristics of each.
upvoted 0 times
...
Kanisha
5 months ago
I'm not entirely confident, but I think statement 1 doesn't really align with Beyond Budgeting since it's about moving away from traditional processes, right?
upvoted 0 times
...
Bernardine
5 months ago
I remember we discussed the importance of disclosures for non-insured products, so I think option D could be right.
upvoted 0 times
...
Reed
5 months ago
ACK Flood, UDP Flood, and SYN Flood - those all sound like DDoS attacks that this service could defend against. I'm not as familiar with CMP Flood, so I'll have to think about that one a bit more.
upvoted 0 times
...
Amber
2 years ago
Haha, I'm just picturing the IT guy trying to explain 'group authentication' to the Marketing team. Like, 'yeah, you all have to log in together. No solo surfing for you!'
upvoted 0 times
Lang
1 year ago
Haha, that would be a funny conversation to witness!
upvoted 0 times
...
Lashawna
2 years ago
C) Role-based access control is the way to go.
upvoted 0 times
...
Darci
2 years ago
A) Mutual authentication would be the best choice.
upvoted 0 times
...
Marylou
2 years ago
Haha, that would be a funny conversation to witness!
upvoted 0 times
...
Nickie
2 years ago
C) Role-based access control is the way to go.
upvoted 0 times
...
Ellsworth
2 years ago
A) Mutual authentication would be the best option.
upvoted 0 times
...
...
Quentin
2 years ago
I think C) Role-based access control is the best choice because it allows for more granular control over who can access what.
upvoted 0 times
...
Cheryll
2 years ago
I'm not sure. Maybe D) Group authentication could also work to restrict access to certain resources.
upvoted 0 times
...
Laurel
2 years ago
I agree with Ollie. Role-based access control makes sense for limiting access to specific network resources.
upvoted 0 times
...
Paulina
2 years ago
Hmm, I'm not so sure. C) Role-based access control seems like a better fit to me. Gives you more granular control over what each user can access.
upvoted 0 times
...
Phuong
2 years ago
I think B) Captive portal is the way to go here. It'll let the Marketing folks access the servers and internet, but keep them out of other network resources.
upvoted 0 times
Kimberlie
2 years ago
Group authentication could potentially give access to other network resources, so it's not the best choice.
upvoted 0 times
...
Mira
2 years ago
Mutual authentication might be too restrictive for the Marketing department's needs.
upvoted 0 times
...
Kasandra
2 years ago
Role-based access control could also work to restrict access to specific resources.
upvoted 0 times
...
Kenda
2 years ago
I agree, Captive portal is the best option for this scenario.
upvoted 0 times
...
...
Ollie
2 years ago
I think the answer is C) Role-based access control.
upvoted 0 times
...

Save Cancel