Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GPEN Topic 8 Question 45 Discussion

Actual exam question for GIAC's GPEN exam
Question #: 45
Topic #: 8
[All GPEN Questions]

The employees of EWS Inc. require remote access to the company's Web servers. In order to provide solid wireless security, the company uses EAP-TLS as the authentication protocol. Which of the following statements are true about EAP-TLS?

Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Denae
5 days ago
I love how they're testing our wireless security knowledge. Next up, they'll be asking about WPA3 and how to hack into the company's fridge.
upvoted 0 times
...
Ronny
6 days ago
Password hashes? Nah, EAP-TLS is all about those client certs, baby. Gotta keep those hackers out with some serious encryption.
upvoted 0 times
...
Cherilyn
8 days ago
Using a public key cert for server auth is a good call, but I wouldn't call EAP-TLS 'moderate' security. That's like calling a diamond 'moderately shiny'.
upvoted 0 times
...
Jillian
11 days ago
But does it provide a moderate level of security?
upvoted 0 times
...
Winifred
18 days ago
EAP-TLS is great for secure remote access, but I'm not sure all manufacturers support it. Maybe they should have included an option about client certificates too.
upvoted 0 times
Latrice
3 days ago
A) It is supported by all manufacturers of wireless LAN hardware and software.
upvoted 0 times
...
...
Carli
23 days ago
Yes, that's correct. It's one of the features of EAP-TLS.
upvoted 0 times
...
Sanda
26 days ago
I think EAP-TLS uses a public key certificate for server authentication.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77