A Chief Information Security Officer (CISO) has decided to implement a secure and user-friendly way to connect to the corporate wireless network.
Each workstation will be authenticated individually using a unique certificate that will be deployed to the workstation by the organization's certificate authority.
Which of the following authentication methods would meet this requirement?
A.
PEAP B.
WP2-PSK C.
Captive portal D.
EAP-TLS.
D.
A Chief Information Security Officer (CISO) has decided to implement a secure and user-friendly way to connect to the corporate wireless network.
Each workstation will be authenticated individually using a unique certificate that will be deployed to the workstation by the organization's certificate authority.
Which of the following authentication methods would meet this requirement?
A.
PEAP
B.
WP2-PSK
C.
Captive portal
D.
EAP-TLS.
D.
The authentication method that would meet the requirement described in the question is EAP-TLS (Extensible Authentication Protocol-Transport Layer Security).
EAP-TLS is a mutual authentication protocol that requires both the client and the server to authenticate each other using digital certificates. In this case, each workstation will be authenticated individually using a unique certificate that will be deployed to the workstation by the organization's certificate authority. This approach provides a secure and user-friendly way to connect to the corporate wireless network, as each workstation will have its own certificate, making it difficult for unauthorized users to connect to the network.
PEAP (Protected Extensible Authentication Protocol) is another authentication protocol that provides an encrypted tunnel for user authentication, but it does not require digital certificates on each workstation, which is a requirement in this scenario.
WPA2-PSK (Wi-Fi Protected Access II - Pre-Shared Key) is a security protocol that uses a pre-shared key for authentication, which is not as secure as using digital certificates.
Captive portal is not an authentication protocol, but rather a web page that is presented to users when they first connect to a Wi-Fi network, requiring them to agree to certain terms and conditions before accessing the internet.
In summary, EAP-TLS is the best authentication method for this scenario as it meets the CISO's requirements of individual workstation authentication using digital certificates, providing a secure and user-friendly way to connect to the corporate wireless network.