New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GPEN Exam - Topic 8 Question 45 Discussion

Actual exam question for GIAC's GPEN exam
Question #: 45
Topic #: 8
[All GPEN Questions]

The employees of EWS Inc. require remote access to the company's Web servers. In order to provide solid wireless security, the company uses EAP-TLS as the authentication protocol. Which of the following statements are true about EAP-TLS?

Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Bo
3 months ago
EAP-TLS is the best choice for wireless security, no doubt!
upvoted 0 times
...
Barb
3 months ago
Not all manufacturers support it, though.
upvoted 0 times
...
Jesusita
3 months ago
Wait, does it really provide only moderate security?
upvoted 0 times
...
Ernie
4 months ago
Totally agree, EAP-TLS is solid for security!
upvoted 0 times
...
Vilma
4 months ago
It uses a public key certificate for server authentication.
upvoted 0 times
...
Lanie
4 months ago
I’m pretty sure EAP-TLS doesn’t use password hashes for client authentication; it relies on certificates instead.
upvoted 0 times
...
Sarah
4 months ago
I practiced a similar question, and I believe EAP-TLS is widely supported, but I’m not confident about all manufacturers.
upvoted 0 times
...
Yolande
4 months ago
I think EAP-TLS uses public key certificates for server authentication, but I can't recall if it does for clients too.
upvoted 0 times
...
Bulah
5 months ago
I remember EAP-TLS is known for strong security, but I’m not sure if it’s considered moderate or high.
upvoted 0 times
...
Marg
5 months ago
I'm a little fuzzy on the specifics of EAP-TLS. I'll read through the question carefully and try to eliminate the incorrect statements.
upvoted 0 times
...
Julene
5 months ago
This looks straightforward. I'm confident I can select the correct answers based on my understanding of wireless security protocols.
upvoted 0 times
...
Toi
5 months ago
Okay, I know EAP-TLS uses certificates for authentication, so that's a good start. I'll focus on identifying the true statements about how it works.
upvoted 0 times
...
Mauricio
5 months ago
Hmm, I'm a bit unsure about the details of EAP-TLS. I'll need to review my notes to make sure I understand the security features.
upvoted 0 times
...
Dana
5 months ago
I'm pretty familiar with EAP-TLS, so I think I can handle this one. Let me think through the key points.
upvoted 0 times
...
German
5 months ago
Okay, let me see here. I think the key is understanding what a "what-if scenario" is in the context of a simulation. I'll need to recall that information to choose the right answer.
upvoted 0 times
...
Theron
5 months ago
I feel like I've seen a question similar to this before, and I think A and C could be possible options for Express Connection.
upvoted 0 times
...
Luis
5 months ago
From practice questions, it feels like C might be accurate since most networks today are online.
upvoted 0 times
...
Timmy
5 months ago
Okay, let's think this through. The question mentions a strict security policy, so encryption is a must. And the application needs line-rate throughput, which rules out some of the slower options. I'm leaning towards MACsec, but I'll double-check the details on the other choices just to be sure.
upvoted 0 times
...
Lenora
5 months ago
This question seems familiar; I feel like we had a practice one where we discussed indemnification clauses. I might be mixing them up, though.
upvoted 0 times
...
Denae
10 months ago
I love how they're testing our wireless security knowledge. Next up, they'll be asking about WPA3 and how to hack into the company's fridge.
upvoted 0 times
Samira
9 months ago
I wonder if they'll also ask about WPA3 next.
upvoted 0 times
...
Eleonora
9 months ago
D) It provides a moderate level of security.
upvoted 0 times
...
Lenna
9 months ago
B) It uses a public key certificate for server authentication.
upvoted 0 times
...
Amie
10 months ago
A) It is supported by all manufacturers of wireless LAN hardware and software.
upvoted 0 times
...
...
Ronny
10 months ago
Password hashes? Nah, EAP-TLS is all about those client certs, baby. Gotta keep those hackers out with some serious encryption.
upvoted 0 times
...
Cherilyn
10 months ago
Using a public key cert for server auth is a good call, but I wouldn't call EAP-TLS 'moderate' security. That's like calling a diamond 'moderately shiny'.
upvoted 0 times
...
Jillian
10 months ago
But does it provide a moderate level of security?
upvoted 0 times
...
Winifred
11 months ago
EAP-TLS is great for secure remote access, but I'm not sure all manufacturers support it. Maybe they should have included an option about client certificates too.
upvoted 0 times
Beckie
9 months ago
I agree, client certificates would have been a good addition for even more security.
upvoted 0 times
...
Ryan
9 months ago
D) It provides a moderate level of security.
upvoted 0 times
...
Hyman
9 months ago
B) It uses a public key certificate for server authentication.
upvoted 0 times
...
Latrice
10 months ago
A) It is supported by all manufacturers of wireless LAN hardware and software.
upvoted 0 times
...
...
Carli
11 months ago
Yes, that's correct. It's one of the features of EAP-TLS.
upvoted 0 times
...
Sanda
11 months ago
I think EAP-TLS uses a public key certificate for server authentication.
upvoted 0 times
...

Save Cancel