New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA N10-009 Exam - Topic 2 Question 4 Discussion

Actual exam question for CompTIA's N10-009 exam
Question #: 4
Topic #: 2
[All N10-009 Questions]

An organization has a security requirement that all network connections can be traced back to a user. A network administrator needs to identify a solution to implement on the wireless network. Which of the following is the best solution?

Show Suggested Answer Hide Answer
Suggested Answer: A

Enterprise authentication (such as WPA2-Enterprise) utilizes unique credentials for each user, typically integrating with an authentication server like RADIUS. This allows for tracking and logging user activity, ensuring that all connections can be traced back to individual users. PSKs (Pre-Shared Keys) are shared among users and do not provide individual accountability. Captive portals can identify users but are less secure than enterprise authentication, and Wired Equivalent Privacy (WEP) is outdated and not recommended for security purposes.


CompTIA Network+ materials highlight enterprise authentication methods as the preferred solution for secure and accountable wireless network access.

Contribute your Thoughts:

0/2000 characters
Matilda
3 months ago
Enterprise authentication is the way to go for user accountability!
upvoted 0 times
...
Kimberely
3 months ago
Wired equivalent protection is outdated, not a good option here.
upvoted 0 times
...
Linwood
3 months ago
Wait, can captive portals really trace users effectively?
upvoted 0 times
...
Elza
4 months ago
I disagree, PSKs can be shared and aren't secure enough.
upvoted 0 times
...
Dana
4 months ago
A is definitely the best choice for traceability.
upvoted 0 times
...
Rickie
4 months ago
Wired equivalent protection seems outdated for this scenario; I doubt it would meet the tracing requirement.
upvoted 0 times
...
Twanna
4 months ago
Captive portals could work, but I feel like they might not provide the level of traceability needed for security requirements.
upvoted 0 times
...
Virgina
4 months ago
I remember practicing a question similar to this, and I think requiring PSKs doesn't really trace back to individual users effectively.
upvoted 0 times
...
Micheline
5 months ago
I think enterprise authentication might be the best choice since it ties users to their network access, but I'm not entirely sure.
upvoted 0 times
...
Reena
5 months ago
Enterprise authentication is the clear winner in my opinion. It provides the strongest user identification and connection traceability for the given security requirement. The other options don't seem as robust.
upvoted 0 times
...
Jenelle
5 months ago
I'm a bit confused by the options here. Can someone explain the differences between enterprise authentication, PSKs, and captive portals? I want to make sure I understand the pros and cons of each.
upvoted 0 times
...
Hoa
5 months ago
Ah, I know this type of question. Implementing enterprise authentication is definitely the way to go to meet the traceability requirement. That's my pick.
upvoted 0 times
...
Jamal
5 months ago
Hmm, I'm not sure about this one. The options seem a bit technical. I'll need to think through the security requirements carefully to decide the best approach.
upvoted 0 times
...
Edgar
5 months ago
This seems like a straightforward security question. I think implementing enterprise authentication would be the best solution to trace network connections back to users.
upvoted 0 times
...
Shanda
5 months ago
A combination of TDD and BDD could be a good approach to improve the pre-build testing, as the question suggests.
upvoted 0 times
...
Shonda
5 months ago
My strategy is to eliminate what I know are typically considered preventive care. Immunizations, check-ups, and smoking cessation programs all sound like legit preventive services.
upvoted 0 times
...
Margart
5 months ago
No problem, I've got this. Adding the new statuses to the enumeration and updating the switch statement should be a quick fix.
upvoted 0 times
...
Janella
2 years ago
Captive portals? More like 'captive my attention for way too long.' Let's keep it simple, folks.
upvoted 0 times
...
Cassandra
2 years ago
Enterprise authentication is the clear winner here. Anything else is just a security band-aid on a wireless network.
upvoted 0 times
...
Claudio
2 years ago
Wired equivalent protection? What is this, the Stone Age? That's just asking for trouble on a wireless network.
upvoted 0 times
Bulah
1 year ago
D: PSKs are not as secure as enterprise authentication, so I would go with that option.
upvoted 0 times
...
Raul
1 year ago
C: Captive portal for users could also work well in ensuring traceability of network connections.
upvoted 0 times
...
Magdalene
1 year ago
B: I think implementing enterprise authentication would be the best solution for tracing network connections back to users.
upvoted 0 times
...
Josphine
1 year ago
A: I agree, wired equivalent protection is outdated and not secure.
upvoted 0 times
...
...
Annita
2 years ago
PSKs? Really? That's so 2005. Wireless security has come a long way since then.
upvoted 0 times
Benedict
1 year ago
I agree, PSKs are outdated for wireless security.
upvoted 0 times
...
Isidra
2 years ago
Implementing enterprise authentication is the best solution.
upvoted 0 times
...
...
Tish
2 years ago
I think enforcing wired equivalent protection is the way to go.
upvoted 0 times
...
Oretha
2 years ago
Captive portals can be a hassle, but they do provide some level of user accountability. Worth considering.
upvoted 0 times
...
Tamra
2 years ago
I think configuring a captive portal for users would be the most effective solution.
upvoted 0 times
...
Alfred
2 years ago
I disagree, I believe requiring the use of PSKs is the best option.
upvoted 0 times
...
Martina
2 years ago
Enterprise authentication is the way to go. Tracing back each connection to a user is crucial for security compliance.
upvoted 0 times
Rolland
2 years ago
C) Configuring a captive portal for users
upvoted 0 times
...
Carlton
2 years ago
That's the best solution for ensuring all network connections can be traced back to a user.
upvoted 0 times
...
Shoshana
2 years ago
A) Implementing enterprise authentication
upvoted 0 times
...
Valentin
2 years ago
C) Configuring a captive portal for users
upvoted 0 times
...
Cordelia
2 years ago
That's a good point. It's important to have a secure way to trace back connections.
upvoted 0 times
...
Fernanda
2 years ago
A) Implementing enterprise authentication
upvoted 0 times
...
...
An
2 years ago
I think the best solution is implementing enterprise authentication.
upvoted 0 times
...

Save Cancel