which of the following should Pete, an administrator, a…

While setting up a secure wireless corporate network, which of the following should Pete, an administrator, avoid implementing?

While setting up a secure wireless corporate network, which of the following should Pete, an administrator, avoid implementing?

A.
EAP-TLS

B.
PEAP

C.
WEP

D.
WPA

Explanation:
WEP is one of the more vulnerable security protocols. The only time to use WEP is when you must have compatibility with older devices that do not support new
encryption.
Incorrect Answers:

A, B: Extensible Authentication Protocol (EAP) provides a framework for authentication that is often used with wireless networks. Among the five EAP types
adopted by the WPA/WPA2 standard are EAP-TLS, EAP-PSK, EAP-MD5, and two that you need to know for the exam:
LEAP and PEAP.
D: The Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2) authentication protocols were designed to address the core, easy-to-crack problems
of WEP.

Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, Sixth Edition, Sybex, Indianapolis, 2014, pp 171, 181-182, 182-183, 258



Leave a Reply 0

Your email address will not be published. Required fields are marked *