A company is implementing a wireless network and using wireless devices as part of the corporate environment. Which two server-based authentication methods should the company consider in the wireless network design? (Choose two.)

IT Questions BankCategory: IT EssentialsA company is implementing a wireless network and using wireless devices as part of the corporate environment. Which two server-based authentication methods should the company consider in the wireless network design? (Choose two.)

Question:
A company is implementing a wireless network and using wireless devices as part of the corporate environment. Which two server-based authentication methods should the company consider in the wireless network design? (Choose two.)

  • AES
  • RADIUS
  • TACACS
  • TKIP
  • WPA2-PSK

Explanation: RADIUS and TACACS require a server that would authenticate wired/wireless devices as well as users.

Exam with this question: IT Essentials (ITE v7) Chapter 11 Exam Answers
Exam with this question: IT Essentials (Version 8.0) Chapter 11 Exam Answers ITE v8.0

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments