A security administrator has been tasked with setting up a new internal wireless network that must use end to
end TLS. Which of the following may be used to meet this objective?
Wi-Fi Protected Access 2 (WPA2) was intended to provide security that’s equivalent to that on a wired network,
and it implements elements of the 802.11i standard. In April 2010, the Wi-Fi Alliance announced the inclusion
of additional Extensible Authentication Protocol (EAP) types to its certification programs for WPA- and WPA2-
Enterprise certification programs. EAP-TLS is included in this certification program.
Note: Although WPA mandates the use of TKIP, WPA2 requires Counter Mode with Cipher Block Chaining
Message Authentication Code Protocol (CCMP). CCMP uses 128-bit AES encryption with a 48-bit initialization
vector. With the larger initialization vector, it increases the difficulty in cracking and minimizes the risk of a