Which of the follow...
 
Notifications
Clear all

Which of the following should the company implement to BEST prevent this from occurring?

1 Posts
1 Users
0 Likes
374 Views
(@woodliffrueben)
Noble Member
Joined: 2 years ago
Posts: 735
Topic starter  

A company uses wireless tor all laptops and keeps a very detailed record of its assets, along with a comprehensive list of devices that are authorized to be on the wireless network. The Chief Information Officer (CIO) is concerned about a script kiddie potentially using an unauthorized device to brute force the wireless PSK and obtain access to the internal network.

Which of the following should the company implement to BEST prevent this from occurring?

  • A . A BPDU guard
  • B . WPA-EAP
  • C . IP filtering
  • D . A WIDS

Show Answer Hide Answer

Suggested Answer: B

Explanation:

"EAP is in wide use. For example, in IEEE 802.11 (WiFi) the WPA and WPA2 standards have adopted IEEE 802.1X (with various EAP types) as the canonical authentication mechanism."

https://en.wikipedia.org/wiki/Extensible_Authentication_Protocol

The Wi-Fi Alliance added EAP-FAST (along with EAP-TLS and EAP-TTLS) to its list of supported protocols for WPA/WPA2 in 2010.

Source: https://jaimelightfoot.com/blog/comptia-security-wireless-security/ “EAP has been expanded into multiple versions.”

• “The Wi-Fi Alliance added PEAP to its list of supported protocols for WPA/WPA2/WPA3.”

• “The Wi-Fi Alliance added EAP-FAST to its list of supported protocols for WPA/WPA2/WPA3.”

• “The Wi-Fi Alliance added EAP-TTLS to its list of supported protocols for WPA/WPA2/WPA3.”

Excerpt From: Wm. Arthur Conklin. “CompTIA Security+ All-in-One Exam Guide (Exam SY0-601)).”

   
Quote

Latest CompTIA SY0-601 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: