For maximum security, you should base WLAN user authentication on which one of the following?

Master the NCTI Introduction to Networking – Wireless Exam. Prepare with diverse flashcards and multiple choice questions, each accompanied by hints and detailed explanations. Ensure your success!

Multiple Choice

For maximum security, you should base WLAN user authentication on which one of the following?

Explanation:
Focusing on the user’s identity for WLAN access provides the most flexible and enforceable security controls across a mix of devices. When authentication is tied to a user name and password (and can be augmented with multi-factor authentication), the network can enforce consistent policies through a centralized server (like RADIUS) and directory services. This means you can revoke access quickly if a user leaves the organization, enforce strong password or MFA requirements, and apply the same rules whether the user is on a corporate device, a personal device, or a guest device. The device is not trusted by default; instead, access is granted only after the user proves who they are, which helps protect the network even if devices are compromised. Device-based certificates, while strong, rely on PKI and device enrollment, which complicates management, especially in BYOD scenarios. Passwordless tokens can be very secure but add token-management overhead and potential availability issues if the token isn’t present. Biometric-only methods aren’t practical as the sole layer for WLAN access and raise deployment and privacy concerns. So, using device-independent user credentials aligns with scalable, policy-driven security that can be consistently enforced across diverse devices and users.

Focusing on the user’s identity for WLAN access provides the most flexible and enforceable security controls across a mix of devices. When authentication is tied to a user name and password (and can be augmented with multi-factor authentication), the network can enforce consistent policies through a centralized server (like RADIUS) and directory services. This means you can revoke access quickly if a user leaves the organization, enforce strong password or MFA requirements, and apply the same rules whether the user is on a corporate device, a personal device, or a guest device. The device is not trusted by default; instead, access is granted only after the user proves who they are, which helps protect the network even if devices are compromised.

Device-based certificates, while strong, rely on PKI and device enrollment, which complicates management, especially in BYOD scenarios. Passwordless tokens can be very secure but add token-management overhead and potential availability issues if the token isn’t present. Biometric-only methods aren’t practical as the sole layer for WLAN access and raise deployment and privacy concerns. So, using device-independent user credentials aligns with scalable, policy-driven security that can be consistently enforced across diverse devices and users.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy