The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. Which of the following protocols and authentication methods should the technician implement? (Choose two.)

Last Updated on August 4, 2021 by Admin 2

A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources.

Which of the following protocols and authentication methods should the technician implement? (Choose two.)

  • WPA
  • WPA2
  • WEP
  • TKIP
  • RADIUS
  • Multifactor
  • TACACS
  • SSO
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments