PrepAway - Latest Free Exam Questions & Answers

which of the following should Pete, an administrator, avoid implementing?

While setting up a secure wireless corporate network, which of the following should Pete, an
administrator, avoid implementing?

PrepAway - Latest Free Exam Questions & Answers

A.
EAP-TLS

B.
PEAP

C.
WEP

D.
WPA

Explanation:
WEP is one of the more vulnerable security protocols. The only time to use WEP is when you must have
compatibility with older devices that do not support new encryption.
Incorrect Answers:
A, B: Extensible Authentication Protocol (EAP) provides a framework for authentication that is often used
with wireless networks. Among the five EAP types adopted by the WPA/WPA2 standard are EAP-TLS, EAPPSK, EAP-MD5, and two that you need to know for the exam: LEAP and PEAP.
D: The Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2) authentication protocols were
designed to address the core, easy-to-crack problems of WEP.

Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, 6th Edition, Sybex, Indianapolis,
2014, pp. 171, 181-182, 182-183, 258


Leave a Reply