A company uses wireless tor all laptops and keeps a very detailed record of its assets, along with a comprehensive list of devices that are authorized to be on the wireless network. The Chief Information Officer (CIO) is concerned about a script kiddie potentially using an unauthorized device to brute force the wireless PSK and obtain access to the internal network .
Which of the following should the company implement to BEST prevent this from occurring?
A . A BPDU guard
B . WPA-EAP
C . IP filtering
D . A WIDS
Answer: B
Explanation:
"EAP is in wide use. For example, in IEEE 802.11 (WiFi) the WPA and WPA2 standards have adopted IEEE 802.1X (with various EAP types) as the canonical authentication mechanism."
https://en.wikipedia.org/wiki/Extensible_Authentication_Protocol
The Wi-Fi Alliance added EAP-FAST (along with EAP-TLS and EAP-TTLS) to its list of supported protocols for WPA/WPA2 in 2010. Source: https://jaimelightfoot.com/blog/comptia-security-wireless-security/ “EAP has been expanded into multiple versions.”
• “The Wi-Fi Alliance added PEAP to its list of supported protocols for WPA/WPA2/WPA3.”
• “The Wi-Fi Alliance added EAP-FAST to its list of supported protocols for WPA/WPA2/WPA3.”
• “The Wi-Fi Alliance added EAP-TTLS to its list of supported protocols for WPA/WPA2/WPA3.” Excerpt From: Wm. Arthur Conklin. “CompTIA Security+ All-in-One Exam Guide (Exam SY0-601)).”
Latest SY0-601 Dumps Valid Version with 396 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund