Which two steps must you take to provide maximum security when using a pre-shared key?

Strong security is required, but a centralized RADIUS authenticator has not been implemented.
Which two steps must you take to provide maximum security when using a pre-shared key?
(Choose two.)

Strong security is required, but a centralized RADIUS authenticator has not been implemented.
Which two steps must you take to provide maximum security when using a pre-shared key?
(Choose two.)

A.
Change the TKIP on a weekly basis.

B.
Use a key that includes mixed-case letters, numbers, and symbols with a length greater than 10
characters.

C.
Use only with WPA and WPA2, following proper strong key guidelines.

D.
Use the longest possible WEP key in your security policy.



Leave a Reply 3

Your email address will not be published. Required fields are marked *


nephelai

nephelai

Another form of basic security now available is WPA or WPA2 Pre-Shared Key (PSK). The PSK verifies users via a password, or identifying code, (also called a passphrase) on both the client station and the access point. A client may only gain access to the network if the client’s password matches the access point’s password. The PSK also provides keying material that TKIP or AES use to generate an encryption key for each packet of transmitted data. While more secure than static WEP, PSK is similar to static WEP in that the PSK is stored on the client station and can be compromised if the client station is lost or stolen. A strong PSK passphrase that uses a mixture of letters, numbers, and non-alphanumeric characters is recommended.