An organization has a security requirement that all network connections can be traced back to a user. A network administrator needs to identify a solution to implement on the wireless network. Which of the following is the best solution?
Enterprise authentication (such as WPA2-Enterprise) utilizes unique credentials for each user, typically integrating with an authentication server like RADIUS. This allows for tracking and logging user activity, ensuring that all connections can be traced back to individual users. PSKs (Pre-Shared Keys) are shared among users and do not provide individual accountability. Captive portals can identify users but are less secure than enterprise authentication, and Wired Equivalent Privacy (WEP) is outdated and not recommended for security purposes.
CompTIA Network+ materials highlight enterprise authentication methods as the preferred solution for secure and accountable wireless network access.
Janella
4 months agoCassandra
4 months agoClaudio
4 months agoBulah
3 months agoRaul
3 months agoMagdalene
3 months agoJosphine
3 months agoAnnita
4 months agoBenedict
3 months agoIsidra
3 months agoTish
4 months agoOretha
5 months agoTamra
5 months agoAlfred
5 months agoMartina
5 months agoRolland
4 months agoCarlton
4 months agoShoshana
4 months agoValentin
4 months agoCordelia
4 months agoFernanda
4 months agoAn
5 months ago