A security administrator is performing a risk assessment on a legacy WAP with a WEP-enabled wireless infrastructure.
Which of the following should be implemented to harden the infrastructure without upgrading the WAP?
Click on the arrows to vote for the correct answer
A. B. C. D.D.
The correct answer to this question is A. Implement WPA and TKIP.
Explanation: WEP (Wired Equivalent Privacy) is an older wireless security protocol that is known to be insecure, as it uses a weak encryption algorithm (RC4). Therefore, it is recommended to avoid using WEP wherever possible. However, in some cases, it may not be feasible to upgrade the WAP due to various reasons, such as budget constraints or compatibility issues with legacy devices.
In such cases, the best option is to implement WPA (Wi-Fi Protected Access) with TKIP (Temporal Key Integrity Protocol). WPA is a more secure wireless security protocol than WEP, and it uses a stronger encryption algorithm (AES). TKIP is an encryption protocol that is used to improve the security of WPA by providing per-packet key mixing with a rekeying mechanism.
WPA and TKIP are backward-compatible with older devices that support WEP, which makes them a good option for hardening a legacy wireless infrastructure without upgrading the WAP.
Option B, Implementing WPS (Wi-Fi Protected Setup) and an eight-digit pin, is not a good option as WPS is known to have security vulnerabilities that can be exploited by attackers to gain unauthorized access to the wireless network.
Option C, Implementing WEP and RC4, is not recommended as it is known to be insecure.
Option D, Implementing WPA2 Enterprise, is not feasible without upgrading the WAP as it requires more advanced hardware and software features that may not be supported by older devices.