Which two steps must you take to provide maximum security when using a pre-shared key?

Strong security is required, but a centralized RADIUS authenticator has not been implemented.
Which two steps must you take to provide maximum security when using a pre-shared key?
(Choose two.)

Strong security is required, but a centralized RADIUS authenticator has not been implemented.
Which two steps must you take to provide maximum security when using a pre-shared key?
(Choose two.)

A.
Change the TKIP on a weekly basis.

B.
Use a key that includes mixed-case letters, numbers, and symbols with a length greater than 10
characters.

C.
Use only with WPA and WPA2, following proper strong key guidelines.

D.
Use the longest possible WEP key in your security policy.



Leave a Reply 0

Your email address will not be published. Required fields are marked *