Jane, a security administrator, needs to implement a secure wireless authentication method that uses a remote RADIUS server for authentication. Which of the following is an authentication method Jane should use?

A. WPA2-PSK
B. WEP-PSK
C. CCMP
D. LEAP


Answer: D. LEAP

Computer Science & Information Technology

You might also like to view...

A package is:

a. A directory structure used to organize classes and interfaces. b. A mechanism for software reuse. c. A group of related classes and interfaces. d. All of the above.

Computer Science & Information Technology

To set up a file to perform file I/O, you must declare

A) at least one variable to write to the file. B) one or more file stream objects. C) a string array to store the file contents. D) All of the above E) None of the above

Computer Science & Information Technology

Insert a column ________ to manually align columns in a more even fashion; for example, forcing a column to start at the top of a page

Fill in the blank(s) with correct word

Computer Science & Information Technology

A 20th century date is assumed when a two digit year between ________ is entered in a worksheet cell

A) 10 and 79 B) 30 and 99 C) 20 and 89 D) 00 and 69

Computer Science & Information Technology