An organization has a security requirement that all network connections can be traced back to a user. A network administrator needs to identify a solution to implement on the wireless network. Which of the following is the best solution?
Enterprise authentication (such as WPA2-Enterprise) utilizes unique credentials for each user, typically integrating with an authentication server like RADIUS. This allows for tracking and logging user activity, ensuring that all connections can be traced back to individual users. PSKs (Pre-Shared Keys) are shared among users and do not provide individual accountability. Captive portals can identify users but are less secure than enterprise authentication, and Wired Equivalent Privacy (WEP) is outdated and not recommended for security purposes.
CompTIA Network+ materials highlight enterprise authentication methods as the preferred solution for secure and accountable wireless network access.
Matilda
3 months agoKimberely
3 months agoLinwood
3 months agoElza
4 months agoDana
4 months agoRickie
4 months agoTwanna
4 months agoVirgina
4 months agoMicheline
5 months agoReena
5 months agoJenelle
5 months agoHoa
5 months agoJamal
5 months agoEdgar
5 months agoShanda
5 months agoShonda
5 months agoMargart
5 months agoJanella
2 years agoCassandra
2 years agoClaudio
2 years agoBulah
1 year agoRaul
1 year agoMagdalene
1 year agoJosphine
1 year agoAnnita
2 years agoBenedict
1 year agoIsidra
2 years agoTish
2 years agoOretha
2 years agoTamra
2 years agoAlfred
2 years agoMartina
2 years agoRolland
2 years agoCarlton
2 years agoShoshana
2 years agoValentin
2 years agoCordelia
2 years agoFernanda
2 years agoAn
2 years ago