A network technician is installing a new wireless network for a client.
The client has experienced issues with other building tenants connecting to the wireless network and utilizing the bandwidth.
The client wants to prevent this from happening by using certificate-based authentication.
Which of the following technologies should the network administrator implement?
A.
WPA-PSK B.
EAP-TLS C.
AES-CCMP D.
WEP-TKIP.
B.
A network technician is installing a new wireless network for a client.
The client has experienced issues with other building tenants connecting to the wireless network and utilizing the bandwidth.
The client wants to prevent this from happening by using certificate-based authentication.
Which of the following technologies should the network administrator implement?
A.
WPA-PSK
B.
EAP-TLS
C.
AES-CCMP
D.
WEP-TKIP.
B.
The correct technology that the network administrator should implement to prevent other building tenants from connecting and utilizing the bandwidth is EAP-TLS (Extensible Authentication Protocol-Transport Layer Security).
EAP-TLS is a certificate-based authentication protocol that requires both the client device and the access point to have digital certificates. These certificates are used to authenticate both the client and the server before allowing access to the wireless network. This authentication process is more secure than other authentication methods like WPA-PSK (Wi-Fi Protected Access-Pre-Shared Key) and WEP-TKIP (Wired Equivalent Privacy-Temporal Key Integrity Protocol) which use a shared secret key.
WPA-PSK uses a shared passphrase or key to authenticate clients to the wireless network. This method can be easily compromised if the passphrase is weak or if it is shared with unauthorized users. WEP-TKIP is an older authentication protocol that uses a shared key that is vulnerable to attacks that can reveal the key.
AES-CCMP (Advanced Encryption Standard-Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) is an encryption protocol used to secure wireless network traffic. However, it is not an authentication protocol and does not provide the same level of security as EAP-TLS.
In summary, EAP-TLS is the most secure authentication protocol for wireless networks as it requires digital certificates and provides strong authentication before granting access to the wireless network.