What option meets these requirements?

You were hired as a wireless consultant to plan and design a secure WLAN on a Cisco Unified
Wireless Network, allowing access only by the employees of the company. The requirements are
as follows:
Authenticate employees based on their existing Active Directory user domain credentials.
The username/password credentials need to be protected during the authentication handshake by
using a PKI.
Encrypt data traffic using the strongest encryption method defined by the 802.11i standard.
Implement a standard authentication method that is supported by most wireless clients and
RADIUS servers
What option meets these requirements?

You were hired as a wireless consultant to plan and design a secure WLAN on a Cisco Unified
Wireless Network, allowing access only by the employees of the company. The requirements are
as follows:
Authenticate employees based on their existing Active Directory user domain credentials.
The username/password credentials need to be protected during the authentication handshake by
using a PKI.
Encrypt data traffic using the strongest encryption method defined by the 802.11i standard.
Implement a standard authentication method that is supported by most wireless clients and
RADIUS servers
What option meets these requirements?

A.
EAP-TLS with WPA2-AES

B.
PEAPv0/EAP-MS-CHAPv2 with WPA2-AES

C.
EAP-FAST/EAP-MS-CHAPv2 (anonymous PAC provisioning) with WPA2-TKIP

D.
EAP-FAST/EAP-MS-CHAPv2 (anonymous PAC provisioning) with WPA2-AES



Leave a Reply 0

Your email address will not be published. Required fields are marked *