ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 13 - N10-009 discussion

Report
Export

An organization has a security requirement that all network connections can be traced back to a user. A network administrator needs to identify a solution to implement on the wireless network. Which of the following is the best solution?

A.
Implementing enterprise authentication
Answers
A.
Implementing enterprise authentication
B.
Requiring the use of PSKs
Answers
B.
Requiring the use of PSKs
C.
Configuring a captive portal for users
Answers
C.
Configuring a captive portal for users
D.
Enforcing wired equivalent protection
Answers
D.
Enforcing wired equivalent protection
Suggested answer: A

Explanation:

Enterprise authentication (such as WPA2-Enterprise) utilizes unique credentials for each user, typically integrating with an authentication server like RADIUS. This allows for tracking and logging user activity, ensuring that all connections can be traced back to individual users. PSKs (Pre-Shared Keys) are shared among users and do not provide individual accountability. Captive portals can identify users but are less secure than enterprise authentication, and Wired Equivalent Privacy (WEP) is outdated and not recommended for security purposes.

CompTIA Network+ materials highlight enterprise authentication methods as the preferred solution for secure and accountable wireless network access.

asked 02/10/2024
Andrew Kavanagh
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first