The administrator would like to use the strongest encryption level possible using PSK without utilizing an additional authentication server. Which of the following encryption types should be implemented?
A. WPA2 Enterprise
B. WEP
C. MAC filtering
D. WPA personal
Answer: A. WPA2 Enterprise
Computer Science & Information Technology
You might also like to view...
A shortcut menu for an object only appears if the object is actually opened, and the user ________ clicks in the opened object
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which access control principle limits a user's access to the specific information required to perform the currently assigned task?
A. need-to-know B. eyes only C. least privilege D. separation of duties
Computer Science & Information Technology