Which of the following authentication methods should Jane use?

Jane, a security administrator, needs to implement a secure wireless authentication method that
uses a remote RADIUS server for authentication. Which of the following authentication methods
should Jane use?

Jane, a security administrator, needs to implement a secure wireless authentication method that
uses a remote RADIUS server for authentication. Which of the following authentication methods
should Jane use?

A.
WPA2-PSK

B.
WEP-PSK

C.
CCMP

D.
LEAP



Leave a Reply 0

Your email address will not be published. Required fields are marked *

11 − two =