Which of the following is an authentication method Jane should use?

Jane, a security administrator, needs to implement a secure wireless authentication method
that uses a remote RADIUS server for authentication. Which of the following is an
authentication method Jane should use?

Jane, a security administrator, needs to implement a secure wireless authentication method
that uses a remote RADIUS server for authentication. Which of the following is an
authentication method Jane should use?

A.
WPA2-PSK

B.
WEP-PSK

C.
CCMP

D.
LEAP



Leave a Reply 0

Your email address will not be published. Required fields are marked *