Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

HP Exam HPE7-A02 Topic 12 Question 13 Discussion

Actual exam question for HP's HPE7-A02 exam
Question #: 13
Topic #: 12
[All HPE7-A02 Questions]

The exhibit shows the 802.1X-related settings for Windows domain clients. What should admins change to make the settings follow best security practices?

Show Suggested Answer Hide Answer
Suggested Answer: A

To follow best security practices for 802.1X authentication settings in Windows domain clients:

Specify at least two server names under 'Connect to these servers':

Admins should explicitly list trusted RADIUS server names (e.g., radius.example.com) to prevent the client from connecting to unauthorized or rogue servers.

This mitigates man-in-the-middle (MITM) attacks where an attacker attempts to present their own RADIUS server.

Select the desired Trusted Root Certificate Authority and 'Don't prompt users':

Select the Trusted Root CA that issued the RADIUS server's certificate. This ensures clients validate the correct server certificate during the EAP-TLS/PEAP authentication process.

Enabling 'Don't prompt users' ensures end users are not confused or tricked into accepting certificates from untrusted servers.

Why the other options are incorrect:

Option C: Incorrect. Wildcards in server names (e.g., *.example.com) weaken security and allow broader matching, increasing the risk of rogue servers.

Option D: Incorrect. Clearing 'Use simple certificate selection' requires users to select certificates manually, which can lead to errors and usability issues. Simple certificate selection is recommended when properly configured.

Recommended Settings for Best Security Practices:

Server Validation: Specify the exact RADIUS server names in the 'Connect to these servers' field.

Root CA Validation: Ensure only the correct Trusted Root Certificate Authority is selected.

User Prompts: Enable 'Don't prompt users' to enforce automatic and secure authentication without user intervention.


Contribute your Thoughts:

Currently there are no comments in this discussion, be the first to comment!


Save Cancel