FUNDAMENTALS OF COMPUTER

TELECOMMUNICATIONS SYSTEMS

COMMUNICATION WIRELESS COMPUTING DEVICES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which technology should be used instead of LEAP?
A
STREAK
B
PEAP
C
LEAP-2
D
REAP
Explanation: 

Detailed explanation-1: -Cisco created EAP-FAST to replace LEAP. EAP-FAST uses a tunnel to provide mutual authentication like PEAP and EAP-TTLS.

Detailed explanation-2: -Ease of Use: For the end-user, it doesn’t make a difference as in both cases, the process is 100% transparent. In terms of deployment, PEAP is a bit easier as you do not have to think about an internal PKI. Security: EAP-TLS is the more secure of the two as it does not rely on passwords.

Detailed explanation-3: -The primary difference between PEAP and EAP-TLS is that it requires certificates on the 802.1x server and on each of the wireless clients. Lightweight EAP (LEAP). Cisco created LEAP using a modified version of the Challenge Handshake Authentication Protocol (CHAP). LEAP does not require a digital certificate.

Detailed explanation-4: -It is far and away the most secure of the common authentication types as each user must be onboarded and identified in the IDP. WPA2-Enterprise requires the use of a secure EAP method to authenticate. The most commonly used include PEAP-MSCHAPv2, EAP-TTLS/PAP, and EAP-TLS.

Detailed explanation-5: -PEAP is an 802.1X authentication method that uses server-side public key certificate to establish a secure tunnel in which the client authenticates with server. The PEAP authentication creates an encrypted SSL/TLS tunnel between client and authentication server.

There is 1 question to complete.