Deploying a Network with Wireless Authentication | CompTIA Network+ N10-007 Exam Question

Implementing Wireless Network Authentication with Username and Password

Prev Question Next Question

Question

A technician wants to deploy a network that will require wireless client devices to prompt for a username and password before granting access to the wireless network.

Which of the following must be configured to implement this solution?

A.

EAP-PEAP B.

CCMP-AES C.

WPA2-PSK D.

TKIP-RC4

A.

Explanations

A technician wants to deploy a network that will require wireless client devices to prompt for a username and password before granting access to the wireless network.

Which of the following must be configured to implement this solution?

A.

EAP-PEAP

B.

CCMP-AES

C.

WPA2-PSK

D.

TKIP-RC4

A.

The correct answer is A. EAP-PEAP.

To implement a network that requires wireless client devices to prompt for a username and password before granting access, a network administrator would typically use a form of authentication called EAP-PEAP (Extensible Authentication Protocol - Protected Extensible Authentication Protocol).

EAP is a protocol used for authentication, and PEAP is a variation of EAP that encrypts the authentication process. This helps protect against eavesdropping and other forms of attack. With EAP-PEAP, a user's credentials are not transmitted in clear text, but rather are encrypted before being sent over the network.

In addition to EAP-PEAP, there are several other authentication protocols that can be used to secure a wireless network, including:

  • WPA2-PSK (Wi-Fi Protected Access 2 - Pre-Shared Key): This method uses a pre-shared key to authenticate clients, rather than requiring a username and password. While WPA2-PSK is a simpler method of authentication, it can be less secure than EAP-PEAP because the pre-shared key is shared among all clients.
  • CCMP-AES (Counter-Mode/CBC-MAC Protocol with AES): This is an encryption protocol used to secure wireless transmissions. While CCMP-AES does not provide authentication, it can be used in conjunction with an authentication protocol like EAP-PEAP to secure wireless traffic.
  • TKIP-RC4 (Temporal Key Integrity Protocol with RC4): This is an older encryption protocol that is no longer recommended for use in secure wireless networks.

In summary, to implement a network that requires wireless client devices to prompt for a username and password before granting access, a network administrator would typically use EAP-PEAP as the authentication protocol.