Which of the following should the company implement to BEST prevent this from occurring?

A company uses wireless tor all laptops and keeps a very detailed record of its assets, along with a comprehensive list of devices that are authorized to be on the wireless network. The Chief Information Officer (CIO) is concerned about a script kiddie potentially using an unauthorized device to brute force the wireless PSK and obtain access to the internal network.

Which of the following should the company implement to BEST prevent this from occurring?
A . A BPDU guard
B . WPA-EAP
C . IP filtering
D . A WIDS

Answer: B

Explanation:

"EAP is in wide use. For example, in IEEE 802.11 (WiFi) the WPA and WPA2 standards have adopted IEEE 802.1X (with various EAP types) as the canonical authentication mechanism."

https://en.wikipedia.org/wiki/Extensible_Authentication_Protocol

The Wi-Fi Alliance added EAP-FAST (along with EAP-TLS and EAP-TTLS) to its list of supported protocols for WPA/WPA2 in 2010.

Source:

https://jaimelightfoot.com/blog/comptia-security-wireless-security/ “EAP has been expanded into multiple versions.” • “The Wi-Fi Alliance added PEAP to its list of supported protocols for WPA/WPA2/WPA3.” • “The Wi-Fi Alliance added EAP-FAST to its list of supported protocols for WPA/WPA2/WPA3.” • “The Wi-Fi Alliance added EAP-TTLS to its list of supported protocols for WPA/WPA2/WPA3.” Excerpt From: Wm. Arthur Conklin.

“CompTIA Security+ All-in-One Exam Guide (Exam SY0-601)).”

Latest SY0-601 Dumps Valid Version with 396 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments