While setting up a secure wireless corporate network, which of the following should Pete, an administrator, avoid implementing?
A. EAP-TLS
B. PEAP
C. WEP
D. WPA
One Comment on “While setting up a secure wireless corporate network, which of the following should Pete, an administrator, av”
meacsays:
READ THE QUESTION PROPERLY: Which one should Pete AVOID implementing
INCORRECT ANSWERS:
The following are strong protocols:
A.EAP-TLS
EAP Transport Layer Security (EAP-TLS), defined in RFC 5216, is an IETF open standard that uses the Transport Layer Security (TLS) protocol, and is well-supported among wireless vendors. EAP-TLS is the original, standard wireless LAN EAP authentication protocol.
B.PEAP
PEAP (Protected Extensible Authentication Protocol) is a version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections. PEAP is designed to provide more secure authentication for 802.11 WLANs (wireless local area networks) that support 802.1X port access control.
D.WPA
Wi-Fi Protected Access (WPA) is a security standard for users of computing devices equipped with wireless internet connections
It has been superseded by WPA2
So Pete should avoid using: C.WEP
Wired Equivalent Privacy (WEP) is a security protocol
WEP is one of the most vulnerable and weakest security protocols. The only time to use WEP is when you must have compatibility with older devices that do not support new encryption.
READ THE QUESTION PROPERLY: Which one should Pete AVOID implementing
INCORRECT ANSWERS:
The following are strong protocols:
A.EAP-TLS
EAP Transport Layer Security (EAP-TLS), defined in RFC 5216, is an IETF open standard that uses the Transport Layer Security (TLS) protocol, and is well-supported among wireless vendors. EAP-TLS is the original, standard wireless LAN EAP authentication protocol.
B.PEAP
PEAP (Protected Extensible Authentication Protocol) is a version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections. PEAP is designed to provide more secure authentication for 802.11 WLANs (wireless local area networks) that support 802.1X port access control.
D.WPA
Wi-Fi Protected Access (WPA) is a security standard for users of computing devices equipped with wireless internet connections
It has been superseded by WPA2
So Pete should avoid using: C.WEP
Wired Equivalent Privacy (WEP) is a security protocol
WEP is one of the most vulnerable and weakest security protocols. The only time to use WEP is when you must have compatibility with older devices that do not support new encryption.
MEMORIZATION HINT: Pete used WEP, then he WEPT
0
0