miriam is a network administrator. she would like to use a wireless authentication technology similar to that found in hotels where users are redirected to a webpage when they connect to the network. what technology should she deploy?