An organization has a security requirement that all network connections can be traced back to a user. A network administrator needs to identify a solution to implement on the wireless network. Which of the following is the best solution?
Enterprise authentication (such as WPA2-Enterprise) utilizes unique credentials for each user, typically integrating with an authentication server like RADIUS. This allows for tracking and logging user activity, ensuring that all connections can be traced back to individual users. PSKs (Pre-Shared Keys) are shared among users and do not provide individual accountability. Captive portals can identify users but are less secure than enterprise authentication, and Wired Equivalent Privacy (WEP) is outdated and not recommended for security purposes.
CompTIA Network+ materials highlight enterprise authentication methods as the preferred solution for secure and accountable wireless network access.
Janella
10 months agoCassandra
10 months agoClaudio
10 months agoBulah
9 months agoRaul
9 months agoMagdalene
9 months agoJosphine
9 months agoAnnita
10 months agoBenedict
9 months agoIsidra
10 months agoTish
10 months agoOretha
11 months agoTamra
11 months agoAlfred
11 months agoMartina
11 months agoRolland
10 months agoCarlton
10 months agoShoshana
10 months agoValentin
10 months agoCordelia
10 months agoFernanda
11 months agoAn
11 months ago