123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Practice: Selecting Authentication Protocols

Profile Picture
By Author: unknownmem
Total Articles: 128
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

In this practice, you will test your understanding of authentication protocol choices for MCSE 2003 exams(http://www.mcse-70-297.com)
. Review the situations in Table 12-2, and evaluate each situation on its own merits (that is, each row in the table represents a different wireless design). In the second column of the table, record your choice of authentication protocol. In the third column, present your reasons for making this choice. If you are unable to answer a question, review the lesson materials and try the question again. You can find answers to the questions in the "Questions and Answers" section at the end of the chapter.
If password authentication is chosen, the user's logon credentials can be auto-matically used if so desired.
QSelect the Validate Server Certificate check box to require validity checks.
If desired, enter the fully qualified domain name suffix of the acceptable CA in the Validate Server Certificate, Connect To These Servers box. This will mean that users will be presented with a trust validation box.
In the Trusted Root Certification Authorities area, select a check box ...
... next to the trusted root CA used to validate certificates. If you have implemented a PKI, your server's name should be available. If you have purchased a 70-297(http://www.mcse-70-297.com)
server certificate, select the check box for the trusted root CA of the issuing company.
Q Select the Use A Different User Name For The Connection check box if the user requires wireless connection using a different account than he or she has logged on with.
PKI Requirements
If a public key infrastructure (PKI) is not established in the network, you must make a decision about how to manage the certificate requirements of 802.Ix. If PEAP-EAP-MSCHAPv2 is the authentication protocol of choice, only a server certificate is neces?sary, and it is not necessary to implement a full-fledged PKI. However, if EAP-TLS is chosen, implementation of a Microsoft certificate services-based PKI can provide the necessary certificate infrastructure. Automatic computer certificate distribution makes the process easier. If an Enterprise CA is installed on a Windows Server 2003 Enterprise server, custom templates—which add the ability to customize key use and application requirements information on the certificate for use with wireless networks—can be designed. This can assist in constraining client connections free Microsoft practice questions(http://www.examshots.com/vendor/Microsoft-1.html)
because certificate validity checks can be based on this information.

Total Views: 272Word Count: 378See All articles From Author

Add Comment

Computers Articles

1. Few Good Insights To Follow With Pc Gaming In Australia!
Author: Jack Williams

2. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy

3. How To Choose The Right Technology For Your mobile App?
Author: goodcoders

4. The Rise Of User Centered Web Design
Author: goodcoders

5. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders

6. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech

7. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech

8. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech

9. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech

10. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech

11. Understanding Ssd Lifespan: Signs, Durability, Data Recovery, And Factors Affecting The Life Of An Ssd
Author: The CyberTech

12. Server Data Recovery Solutions: When Your Raid Server Is Crashed!
Author: The CyberTech

13. Data Recovery Solutions For Undetected Ssd On Bios
Author: The CyberTech

14. Problems Faced By Mobile Phone Users: Green Line Issue, Motherboard Failure, Phone Stuck On Logo And Mobile Data Recovery Possibilities
Author: The CyberTech

15. Ssd Vs Hdd: Weaknesses, Data Recovery Factors And Failure Rates
Author: The CyberTech

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: