PrepAway - Latest Free Exam Questions & Answers

While setting up a secure wireless corporate network, which of the following should Pete, an administrator, av

While setting up a secure wireless corporate network, which of the following should Pete, an administrator, avoid implementing?

PrepAway - Latest Free Exam Questions & Answers

A.
EAP-TLS

B.
PEAP

C.
WEP

D.
WPA

One Comment on “While setting up a secure wireless corporate network, which of the following should Pete, an administrator, av

  1. meac says:

    READ THE QUESTION PROPERLY: Which one should Pete AVOID implementing

    INCORRECT ANSWERS:
    The following are strong protocols:
    A.EAP-TLS
    EAP Transport Layer Security (EAP-TLS), defined in RFC 5216, is an IETF open standard that uses the Transport Layer Security (TLS) protocol, and is well-supported among wireless vendors. EAP-TLS is the original, standard wireless LAN EAP authentication protocol.

    B.PEAP
    PEAP (Protected Extensible Authentication Protocol) is a version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections. PEAP is designed to provide more secure authentication for 802.11 WLANs (wireless local area networks) that support 802.1X port access control.

    D.WPA
    Wi-Fi Protected Access (WPA) is a security standard for users of computing devices equipped with wireless internet connections
    It has been superseded by WPA2

    So Pete should avoid using: C.WEP
    Wired Equivalent Privacy (WEP) is a security protocol
    WEP is one of the most vulnerable and weakest security protocols. The only time to use WEP is when you must have compatibility with older devices that do not support new encryption.

    MEMORIZATION HINT: Pete used WEP, then he WEPT




    0



    0

Leave a Reply