A customer has completed the installation of a Wi-Fi 6 greenfield deployment at their new campus.
They want to leverage Wi-Fi 6 enhanced speeds on the trusted employee WLAN.
To configure the employee WLAN, which two Layer 2 security policies should be used? (Choose two.)
Click on the arrows to vote for the correct answer
A. B. C. D. E.AB.
Wi-Fi 6 (also known as 802.11ax) is the latest wireless networking standard that provides faster speeds, higher capacity, and better performance in high-density environments compared to previous Wi-Fi standards. To leverage the benefits of Wi-Fi 6, the customer wants to configure the employee WLAN with appropriate Layer 2 security policies.
Layer 2 security policies are implemented at the data-link layer of the OSI model and can help prevent unauthorized access to the network. The two Layer 2 security policies that should be used to configure the employee WLAN in this scenario are:
802.1X: This is an IEEE standard that provides port-based network access control (PNAC) to prevent unauthorized devices from accessing the network. With 802.1X, devices are authenticated before they are allowed to access the network. This is accomplished by using an authentication server, such as a RADIUS server, to authenticate the user or device. Once authenticated, the device is granted access to the network.
WPA2 (AES): This is a Wi-Fi security protocol that provides stronger encryption compared to the original WPA standard. WPA2 uses Advanced Encryption Standard (AES) encryption algorithm, which is more secure than the RC4 encryption used in WEP and TKIP used in WPA. WPA2 provides authentication and encryption for wireless networks and is recommended for securing Wi-Fi networks.
The other options are:
OPEN: This is an open authentication method that does not provide any security. Any device can connect to the network without any authentication or encryption. This is not recommended for securing wireless networks.
WEP: Wired Equivalent Privacy (WEP) is an older Wi-Fi security protocol that is no longer recommended for securing wireless networks. WEP uses a weak encryption algorithm that can be easily cracked, and it does not provide authentication.
WPA (AES): WPA (Wi-Fi Protected Access) is an older Wi-Fi security protocol that was introduced to replace WEP. WPA provides stronger encryption compared to WEP, but it still uses the less secure TKIP encryption algorithm. WPA is not recommended for securing Wi-Fi networks as it is vulnerable to attacks.
In summary, to configure the employee WLAN to leverage Wi-Fi 6 enhanced speeds, the Layer 2 security policies that should be used are 802.1X and WPA2 (AES). These policies provide authentication and encryption to prevent unauthorized access to the network and protect sensitive data transmitted over the wireless network.