Which of the following is an authentication method Jane should use?

Jane, a security administrator, needs to implement a secure wireless authentication method that
uses a remote RADIUS server for authentication.
Which of the following is an authentication method Jane should use?

Jane, a security administrator, needs to implement a secure wireless authentication method that
uses a remote RADIUS server for authentication.
Which of the following is an authentication method Jane should use?

A.
WPA2-PSK

B.
WEP-PSK

C.
CCMP

D.
LEAP

Explanation:



Leave a Reply 1

Your email address will not be published. Required fields are marked *


mike

mike

D.LEAP

It is the only “method” listed. My issue with this though is that it is CISCO proprietary and requires using a TACACS. I thought if anything that PEAP would be the more correct resonse as it is open sourced