Which of the following is the most secure protocol that Mark can implement to ensure that the business-related traffic is encrypted?

Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based network. The company is adding an open, high-speed, wireless access for their customers and secured wireless for employees at all 37 branches. He wants to check thevarious security concerns for ensuring that business traffic is secured. He is also under pressure to make this new feature a winning strategy for a company.
Which of the following is the most secure protocol that Mark can implement to ensure that the business-related traffic is encrypted?

Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based network. The company is adding an open, high-speed, wireless access for their customers and secured wireless for employees at all 37 branches. He wants to check thevarious security concerns for ensuring that business traffic is secured. He is also under pressure to make this new feature a winning strategy for a company.
Which of the following is the most secure protocol that Mark can implement to ensure that the business-related traffic is encrypted?

A.
WiFi Protected Access (WPA) 2

B.
Extensible Authentication Protocol (EAP)

C.
Wired Equivalent Privacy (WEP)

D.
Service Set Identifiers



Leave a Reply 0

Your email address will not be published. Required fields are marked *