CompTIA Security+ Exam: SY0-601 Practice Question Answer - Wireless Access Points and PKI Authentication

Wireless Access Points and PKI Authentication

Prev Question Next Question

Question

A network administrator is setting up wireless access points in all the conference rooms and wants to authenticate devices using PKI.

Which of the following should the administrator configure?

A.

A captive portal B.

PSK C.

802.1X D.

WPS.

C.

Explanations

A network administrator is setting up wireless access points in all the conference rooms and wants to authenticate devices using PKI.

Which of the following should the administrator configure?

A.

A captive portal

B.

PSK

C.

802.1X

D.

WPS.

C.

In this scenario, the network administrator wants to authenticate devices using PKI in wireless access points in conference rooms. The best solution for this scenario would be to configure 802.1X authentication.

802.1X is an IEEE standard for port-based network access control that provides authentication to devices that connect to a network. It uses digital certificates to provide secure authentication of devices, which is exactly what the administrator wants in this scenario.

A captive portal is a web page that users are directed to when they try to access a network. It typically requires a user to enter login credentials or accept terms of service before accessing the network. Captive portals are not directly related to PKI and do not provide the same level of security as 802.1X.

PSK stands for Pre-Shared Key and is a simple form of wireless authentication. It uses a shared password to authenticate devices, which is less secure than PKI.

WPS stands for Wi-Fi Protected Setup, which is a method of setting up a wireless network using a PIN or push button. While it does provide some level of security, it is not directly related to PKI and is less secure than 802.1X.

Therefore, 802.1X authentication is the best solution for authenticating devices using PKI in wireless access points in conference rooms.