A security administrator must implement a network authentication solution which will ensure encryption of user
credentials when users enter their username and password to authenticate to the network.
Which of the following should the administrator implement?
WPA2 over EAP-TTLS
WPA2 with WPS
WEP over EAP-PEAP
D: Wired Equivalent Privacy (WEP) is designed to provide security equivalent to that of a wired network. WEP
has vulnerabilities and isn’t considered highly secure. Extensible Authentication Protocol (EAP) provides a
framework for authentication that is often used with wireless networks. Among the five EAP types adopted by
the WPA/ WPA2 standard are EAP-TLS, EAP-PSK, EAP-MD5, as well as LEAP and PEAP.
PEAP is similar in design to EAP-TTLS, requiring only a server-side PKI certificate to create a secure TLS
tunnel to protect user authentication, and uses server-side public key certificates to authenticate the server. It
then creates an encrypted TLS tunnel between the client and the authentication server. In most configurations,
the keys for this encryption are transported using the server’s public key. The ensuing exchange of
authentication information inside the tunnel to authenticate the client is then encrypted and user credentials are
safe from eavesdropping.