New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CISSP Exam - Topic 6 Question 77 Discussion

Actual exam question for ISC2's CISSP exam
Question #: 77
Topic #: 6
[All CISSP Questions]

An organization implements a Remote Access Server (RAS). Once users correct to the server, digital certificates are used to authenticate their identity. What type of Extensible Authentication Protocol (EAP) would the organization use dring this authentication?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Shawnna
3 months ago
SIM isn't really used for RAS, right?
upvoted 0 times
...
Ashlyn
3 months ago
Wait, are we sure about EAP-TLS? Seems too easy.
upvoted 0 times
...
Ryan
3 months ago
EAP-TLS is the way to go, no doubt!
upvoted 0 times
...
Kindra
4 months ago
I thought MD5 was still a thing?
upvoted 0 times
...
Alisha
4 months ago
Definitely EAP-TLS for secure authentication!
upvoted 0 times
...
Laquita
4 months ago
I practiced a similar question, and I believe EAP-TLS is the most secure method listed.
upvoted 0 times
...
Stephen
4 months ago
I think EAP-TLS is the right choice here, especially since it involves digital certificates.
upvoted 0 times
...
Alica
4 months ago
I'm not entirely sure, but I feel like MD5 is outdated for this kind of authentication.
upvoted 0 times
...
Jina
5 months ago
I remember studying EAP-TLS for secure authentication, so I think it's probably option A.
upvoted 0 times
...
Teddy
5 months ago
I've got a good feeling about TLS for this one. The use of digital certificates for authentication is a pretty clear indicator that TLS is the Extensible Authentication Protocol they're using.
upvoted 0 times
...
Nan
5 months ago
I'm a bit confused by all the different authentication protocol options here. I'll need to review my notes on EAP and remote access to make sure I choose the right one.
upvoted 0 times
...
Samuel
5 months ago
Okay, let's see. The question says the organization is using a Remote Access Server, and digital certificates are used for authentication. That makes me think TLS is the most likely answer.
upvoted 0 times
...
Brittney
5 months ago
Hmm, I'm a little unsure about this one. The options seem to cover a range of different authentication protocols, so I'll need to think it through carefully.
upvoted 0 times
...
Lisbeth
5 months ago
This one seems pretty straightforward. The question mentions digital certificates for authentication, so I'm going to go with TLS.
upvoted 0 times
...
Sina
5 months ago
This looks like a good opportunity to apply my knowledge of C++ operator overloading and templates. I'm feeling pretty confident I can work through this step-by-step.
upvoted 0 times
...
Nichelle
5 months ago
The question mentions increased discounts taken, which makes me wonder if that could lead to a decrease in gross profit. Did we cover something like that in class?
upvoted 0 times
...
Margart
5 months ago
Looking at the schema, I seem to recall that only certain attributes are allowed. I'm thinking Options A and E could be the right choices, but it's tricky.
upvoted 0 times
...
Ashlee
5 months ago
Okay, let's see. The question is asking which two packet captures the LINA engine supports. I'll need to carefully consider each option and eliminate the ones that don't fit.
upvoted 0 times
...
Tonette
5 months ago
Okay, let's see here. For rapid development, I'd say deploying to the main network as quickly as possible (option A) seems like the way to go. That would get the code out there the fastest, right?
upvoted 0 times
...
Kenia
9 months ago
Digital certificates? Sounds like they're trying to make this authentication process as complicated as possible. I just want to log in and get my work done!
upvoted 0 times
Alonso
8 months ago
C) Lightweight Extensible Authentication Protocol (EAP)
upvoted 0 times
...
Sang
8 months ago
Digital certificates are necessary for secure authentication.
upvoted 0 times
...
Moira
8 months ago
A) Transport layer security (TLS)
upvoted 0 times
...
...
Sherell
9 months ago
Wait, is this question asking about the best way to unlock my phone or something? I'm so confused!
upvoted 0 times
...
France
9 months ago
SIM? For a remote access server? That's like using a car key to open your front door - doesn't really make sense.
upvoted 0 times
...
Jenelle
9 months ago
Lightweight EAP? I've never heard of that one. Sounds a bit sketchy to me, I'd steer clear of that option.
upvoted 0 times
Lynsey
8 months ago
D) Subscriber Identity Module (SIM)
upvoted 0 times
...
Alesia
8 months ago
C) Lightweight Extensible Authentication Protocol (EAP)
upvoted 0 times
...
Judy
8 months ago
B) Message Digest 5 (MD5)
upvoted 0 times
...
Catrice
9 months ago
A) Transport layer security (TLS)
upvoted 0 times
...
...
Laquita
10 months ago
I'm not sure about MD5 - isn't that an older hashing algorithm that's not really recommended for security these days?
upvoted 0 times
Wade
8 months ago
Yes, MD5 is considered outdated and not as secure as newer options.
upvoted 0 times
...
Marva
9 months ago
C) Lightweight Extensible Authentication Protocol (EAP)
upvoted 0 times
...
Gussie
9 months ago
A) Transport layer security (TLS)
upvoted 0 times
...
...
Filiberto
10 months ago
TLS definitely seems like the right choice here since it's specifically designed for secure authentication using digital certificates.
upvoted 0 times
Stevie
9 months ago
D) Subscriber Identity Module (SIM)
upvoted 0 times
...
France
9 months ago
TLS is the best option for secure authentication
upvoted 0 times
...
Jesusita
9 months ago
C) Lightweight Extensible Authentication Protocol (EAP)
upvoted 0 times
...
Casie
10 months ago
A) Transport layer security (TLS)
upvoted 0 times
...
...
Desiree
10 months ago
I'm not sure about TLS. I think Lightweight Extensible Authentication Protocol (EAP) could also be a good option for authentication.
upvoted 0 times
...
Peter
11 months ago
I agree with Julio. TLS provides secure communication over a network.
upvoted 0 times
...
Julio
11 months ago
I think the organization would use Transport Layer Security (TLS) for authentication.
upvoted 0 times
...

Save Cancel