Implementing Wireless Network Authentication with Username and Password
Question
A technician wants to deploy a network that will require wireless client devices to prompt for a username and password before granting access to the wireless network.
Which of the following must be configured to implement this solution?
A.
EAP-PEAP B.
CCMP-AES C.
WPA2-PSK D.
TKIP-RC4
A.
Explanations
A technician wants to deploy a network that will require wireless client devices to prompt for a username and password before granting access to the wireless network.
Which of the following must be configured to implement this solution?
A.
EAP-PEAP
B.
CCMP-AES
C.
WPA2-PSK
D.
TKIP-RC4
A.
The correct answer is A. EAP-PEAP.
To implement a network that requires wireless client devices to prompt for a username and password before granting access, a network administrator would typically use a form of authentication called EAP-PEAP (Extensible Authentication Protocol - Protected Extensible Authentication Protocol).
EAP is a protocol used for authentication, and PEAP is a variation of EAP that encrypts the authentication process. This helps protect against eavesdropping and other forms of attack. With EAP-PEAP, a user's credentials are not transmitted in clear text, but rather are encrypted before being sent over the network.
In addition to EAP-PEAP, there are several other authentication protocols that can be used to secure a wireless network, including:
- WPA2-PSK (Wi-Fi Protected Access 2 - Pre-Shared Key): This method uses a pre-shared key to authenticate clients, rather than requiring a username and password. While WPA2-PSK is a simpler method of authentication, it can be less secure than EAP-PEAP because the pre-shared key is shared among all clients.
- CCMP-AES (Counter-Mode/CBC-MAC Protocol with AES): This is an encryption protocol used to secure wireless transmissions. While CCMP-AES does not provide authentication, it can be used in conjunction with an authentication protocol like EAP-PEAP to secure wireless traffic.
- TKIP-RC4 (Temporal Key Integrity Protocol with RC4): This is an older encryption protocol that is no longer recommended for use in secure wireless networks.
In summary, to implement a network that requires wireless client devices to prompt for a username and password before granting access, a network administrator would typically use EAP-PEAP as the authentication protocol.