A security administrator must implement a network authentication solution which will ensure encryption of user credentials when users enter their username and password to authenticate to the network. Which of the following should the administrator implement?

A. WPA2 over EAP-TTLS
B. WPA-PSK
C. WPA2 with WPS
D. WEP over EAP-PEAP

Answer: D. WEP over EAP-PEAP

Computer Science & Information Technology

You might also like to view...

Constructing lengthy macros to increase the automation in performance of an Access database can be enhanced by placing ________ upon differing aspects of the macro

Fill in the blank(s) with correct word

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1) A compiler translates high-level language programs into object language. 2) An assembler translates source-language programs into machine-language programs. 3) A compiler converts source-language programs into object-language programs. 4) High-level languages are generally machine-dependent. 5) A machine-language program requires translation before it can be run on a computer.

Computer Science & Information Technology