A security administrator must implement a network authentication solution which will ensure encryption of user credentials when users enter their username and password to authenticate to the network. Which of the following should the administrator implement?

A. WPA2 over EAP-TTLS
B. WPA-PSK
C. WPA2 with WPS
D. WEP over EAP-PEAP


Answer: D. WEP over EAP-PEAP

Computer Science & Information Technology

You might also like to view...

The primary role of the ____________________ security professional is to plan, implement, and oversee the most effective way to respond to physical incidents and disasters as they occur.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

An Inner Join displays data in the record set of a query where the values in both fields used to create the join are ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Space between lines is managed by the ________ of the Detail section

Fill in the blank(s) with correct word

Computer Science & Information Technology

What does the filter condition "*NN" mean?

a. Filter all items that end by NN b. Filter all items that begin with NN c. Filter all 3-character long items that contain NN d. Filter all items that contain NN

Computer Science & Information Technology