A security analyst is hardening a large-scale wireless network.
The primary requirements are the following: -> Must use authentication through EAP-TLS certificates -> Must use an AAA server -> Must use the most secure encryption protocol Given these requirements, which of the following should the analyst implement and recommend? (Choose two.)
Click on the arrows to vote for the correct answer
A. B. C. D. E. F.AF.
The requirements given in the question suggest that the wireless network needs to be secured using strong authentication, encryption, and access control mechanisms.
EAP-TLS certificates are a strong form of authentication that provide mutual authentication between the client and the server. An AAA (Authentication, Authorization, and Accounting) server is used for centralized management of user accounts and access control policies. The most secure encryption protocol for wireless networks is currently CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol).
From the given options, the analyst should implement and recommend 802.1X and CCMP as the solutions that meet the requirements.
802.1X is a standard for port-based network access control that provides authentication for devices connecting to a network. It is commonly used for wireless networks and provides support for EAP-TLS authentication. By using 802.1X, the network can ensure that only authorized devices are granted access.
CCMP is an encryption protocol that provides strong security for wireless networks. It is the recommended encryption protocol for WPA2, which is the most widely used standard for secure wireless networks. CCMP uses the Advanced Encryption Standard (AES) algorithm for encryption, which is considered to be highly secure.
The other options are not relevant to the given requirements. 802.3 is a standard for Ethernet networking, LDAP is a directory service protocol, TKIP is an older encryption protocol that is less secure than CCMP, and WPA2-PSK uses a pre-shared key for authentication, which is not as strong as EAP-TLS certificates.
In summary, the security analyst should implement 802.1X for authentication and CCMP for encryption to meet the requirements for a secure wireless network.