ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 5 - 112-51 discussion

Report
Export

Jessica, a user, wanted to access the Internet from her laptop and therefore sends a connection request to the access point. To identify the wireless client, the access point forwarded that request to a RADIUS server.

The RADIUS server transmitted authentication keys to both the access point and Jessica's laptop. This key helps the access point identify a particular wireless client.

Identify the authentication method demonstrated in the above scenario.

A.
Shared key authentication
Answers
A.
Shared key authentication
B.
Null authentication
Answers
B.
Null authentication
C.
Open system authentication
Answers
C.
Open system authentication
D.
Centralized authentication
Answers
D.
Centralized authentication
Suggested answer: D

Explanation:

Centralized authentication is a method that uses a central server to authenticate users and devices on a network. The central server stores the credentials and access rights of the users and devices, and verifies them when they request to access the network resources. The central server can also provide encryption keys to the users and devices for secure communication. In the scenario, Jessica's laptop and the access point use a RADIUS server as the central server for authentication. The RADIUS server transmits authentication keys to both the access point and Jessica's laptop, which helps the access point identify the wireless client12.

Reference: Network Defense Essentials - EC-Council Learning, Centralized Authentication: What It Is and How It Works

asked 18/09/2024
paloma giraudo
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first