The administrator would like to use the strongest encryption level possible using PSK without utilizing an additional authentication server. Which of the following encryption types should be implemented?

A. WPA2 Enterprise
B. WEP
C. MAC filtering
D. WPA personal

Answer: A. WPA2 Enterprise

Computer Science & Information Technology

You might also like to view...

A shortcut menu for an object only appears if the object is actually opened, and the user ________ clicks in the opened object

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which access control principle limits a user's access to the specific information required to perform the currently assigned task?

A. need-to-know B. eyes only C. least privilege D. separation of duties

Computer Science & Information Technology