A large corporation wants to secure its wireless network so only employees can connect.
Which of the following technologies should be used to control access by user account?
Click on the arrows to vote for the correct answer
A. B. C. D.A.
To control access to a wireless network by user account, the technology that should be used is RADIUS, which stands for Remote Authentication Dial-In User Service.
RADIUS is a network protocol that provides centralized authentication, authorization, and accounting (AAA) management for users who connect to a network. When a user attempts to access a wireless network, their credentials are sent to a RADIUS server, which verifies the user's identity and then grants or denies access to the network based on the user's account permissions.
WPA2 (Wi-Fi Protected Access 2), TKIP (Temporal Key Integrity Protocol), and AES (Advanced Encryption Standard) are all security protocols that are used to secure wireless networks, but they are not specifically designed for controlling access by user account.
WPA2 is a security protocol that provides strong encryption for wireless networks, but it does not provide user authentication or authorization.
TKIP is a legacy security protocol that was designed to provide better security than the original WEP (Wired Equivalent Privacy) protocol, but it has since been replaced by more secure protocols like WPA2.
AES is an encryption standard that is used to secure data in many different applications, but it does not provide authentication or authorization for wireless networks.
Therefore, the correct answer to the question is A. RADIUS.