Which two of the following authentication methods used for WiFi security require the use of certificates?

Which two of the following authentication methods used for WiFi security require the use of
certificates? (Choose two.)

Which two of the following authentication methods used for WiFi security require the use of
certificates? (Choose two.)

A.
PEAP

B.
EAP-FAST

C.
WPA2

D.
WPA1

E.
EAP-TLS

F.
EAP-MD5



Leave a Reply 5

Your email address will not be published. Required fields are marked *


nephelai

nephelai

When you use EAP with a strong EAP type, such as TLS with smart cards or TLS with

certificates, both the client and the server use certificates to verify their identities to each other.
Certificates must meet specific requirements both on the server and on the client for successful
authentication.

jack c

jack c

pea – tl

KMT

KMT

The Protected Extensible Authentication Protocol, also known as Protected EAP or simply PEAP, is a protocol that encapsulates the Extensible Authentication Protocol (EAP) within an encrypted and authenticated Transport Layer Security (TLS) tunnel.