Which two of the following authentication methods used for WiFi security require the use of certificates? (Choose two.)
A. PEAP
B. EAP-FAST
C. WPA2
D. WPA1
E. EAP-TLS
F. EAP-MD5
5 Comments on “Which two of the following authentication methods used for WiFi security require the use of certificates?”
nephelaisays:
When you use EAP with a strong EAP type, such as TLS with smart cards or TLS with
certificates, both the client and the server use certificates to verify their identities to each other.
Certificates must meet specific requirements both on the server and on the client for successful
authentication.
0
0
jack csays:
pea – tl
0
0
dazsays:
P TL
0
0
KMTsays:
The Protected Extensible Authentication Protocol, also known as Protected EAP or simply PEAP, is a protocol that encapsulates the Extensible Authentication Protocol (EAP) within an encrypted and authenticated Transport Layer Security (TLS) tunnel.
When you use EAP with a strong EAP type, such as TLS with smart cards or TLS with
certificates, both the client and the server use certificates to verify their identities to each other.
Certificates must meet specific requirements both on the server and on the client for successful
authentication.
0
0
pea – tl
0
0
P TL
0
0
The Protected Extensible Authentication Protocol, also known as Protected EAP or simply PEAP, is a protocol that encapsulates the Extensible Authentication Protocol (EAP) within an encrypted and authenticated Transport Layer Security (TLS) tunnel.
0
0
PT
0
0