A security analyst is specifying requirements for a wireless network.
The analyst must explain the security features provided by various architecture choices.
Which of the following is provided by PEAP, EAP-TLS, and EAP-TTLS?
Click on the arrows to vote for the correct answer
A. B. C. D.B.
PEAP (Protected Extensible Authentication Protocol), EAP-TLS (Extensible Authentication Protocol-Transport Layer Security), and EAP-TTLS (Extensible Authentication Protocol-Tunneled Transport Layer Security) are all authentication protocols used in wireless networks to secure the communication between the client device and the access point. These protocols provide different security features to ensure the integrity and confidentiality of the communication.
Out of the given options, the security feature provided by all three protocols is mutual authentication.
Mutual authentication means that both the client device and the access point verify each other's identities before establishing a connection. This is done using digital certificates. The access point presents its digital certificate to the client, and the client verifies it to ensure that it is authentic. Similarly, the client presents its digital certificate to the access point, and the access point verifies it to ensure that it is authentic. This ensures that both parties are who they claim to be and prevents man-in-the-middle attacks.
Key rotation refers to the process of changing encryption keys periodically to improve security. While this is a good security practice, it is not a security feature provided by these three protocols.
Secure hashing refers to the use of cryptographic hash functions to ensure the integrity of data. While these protocols may use hashing algorithms in some aspects of the authentication process, they do not provide this as a security feature.
Certificate pinning is a technique used to prevent man-in-the-middle attacks by ensuring that the client device only trusts a specific certificate for a particular website or service. While this is a good security practice, it is not a security feature provided by these three protocols.