A technician wants to deploy a network that will require wireless client devices to prompt for a username and password before granting access to the wireless network.
Which of the following must be configured to implement this solution?
A.
EAP-PEAP B.
CCMP-AES C.
WPA2-PSK D.
TKIP-RC4
A.
A technician wants to deploy a network that will require wireless client devices to prompt for a username and password before granting access to the wireless network.
Which of the following must be configured to implement this solution?
A.
EAP-PEAP
B.
CCMP-AES
C.
WPA2-PSK
D.
TKIP-RC4
A.
The correct answer is A. EAP-PEAP.
To implement a network that requires wireless client devices to prompt for a username and password before granting access, a network administrator would typically use a form of authentication called EAP-PEAP (Extensible Authentication Protocol - Protected Extensible Authentication Protocol).
EAP is a protocol used for authentication, and PEAP is a variation of EAP that encrypts the authentication process. This helps protect against eavesdropping and other forms of attack. With EAP-PEAP, a user's credentials are not transmitted in clear text, but rather are encrypted before being sent over the network.
In addition to EAP-PEAP, there are several other authentication protocols that can be used to secure a wireless network, including:
In summary, to implement a network that requires wireless client devices to prompt for a username and password before granting access, a network administrator would typically use EAP-PEAP as the authentication protocol.