Professional Documents
Culture Documents
CompTIA Security+
SY0-501
CompTIA Security+
Domain 6 –
Cryptography & PKI
6.3 Given a scenario, install
and configure wireless
security settings
Three modes:
● PIN entry
● Push-button configuration (PBC)
● Near Field Communication (NFC)
Authentication protocols
● EAP
○ Requires an authentication server
○ Allows authentication methods beyond username/password
○ Provides support for public certificates
○ Four modes
■ PEAP – Protected EAP
■ EAP-TLS – EAP-Transport Layer Security
■ EAP-TTLS – EAP Tunneled Transport Layer Security
■ EAP-FAST – EAP Flexible Authentication via Secure Tunneling
Authentication protocols
● IEEE 802.1x
○ The IEEE standard for port-based network access control.
● RADIUS Federation
○ Using RADIUS to authenticate between entities.
○ As part of PEAP negotiation, client establishes a TLS
session with a RADIUS server
○ Client authenticates with RADIUS server
Exam Preparation
Also known as WPA-Personal, this is a security
mechanism used to authenticate and validate
users on a wireless LAN (WLAN) or Wi-Fi
connection?
A. WPA-PSK
B. PEAP
C. WPA-TKIP
D. WPA-CCMP
Exam Preparation
This network authentication protocol uses digital
certificate-based mutual authentication, which occurs
automatically with no intervention by the user.
A. PEAP
B. EAP-FAST
C. EAP-TLS
D. EAP-TTLS
CompTIA Security+
Domain 6 –
Cryptography & PKI
6.3 Given a scenario, install
and configure wireless
security settings