Which of the following should be implemented to meet this requirement?

A network administrator must ensure that both the server and the client are authenticated to the wireless
system before access is granted. Which of the following should be implemented to meet this requirement?

A network administrator must ensure that both the server and the client are authenticated to the wireless
system before access is granted. Which of the following should be implemented to meet this requirement?

A.
EAP-PEAP

B.
MAC ACL

C.
EAP-TTLS

D.
MS-CHAPv2



Leave a Reply 1

Your email address will not be published. Required fields are marked *

2 × four =


Shirley Mathew

Shirley Mathew

EAP-PEAP(Extensible Authentication Protocol- Protected Extensible Authentication Protocol)/EAP-MS-CHAPv2: uses password f(x) based on based on NS-CHAPv2 with addition of encrypted TLS tunel.

MAC ACL: (Access Control List- clearly defined list of permissions that specifies what actions an authenticated user may perform on a shared resource

EAP-TTLS(Extensible Authentication Protocol- Tunneled Transport Layer Security: defines use of RADIUS server and mutual authentication requiring certification on both server and every client.

MS-CHAPv2: most common authentication method for dial-up connections