Which security methods require the use of a server? (Choose three)

Disable ads (and more) with a membership for a one time $4.99 payment

Prepare for the MTA Security Exam with flashcards and multiple choice questions. Each question includes hints and explanations. Get ready for your certification test!

The option that includes 802.1x, WPA2 Enterprise, and RADIUS is correct because all three of these technologies typically involve a server for authentication and authorization purposes.

802.1x is a network access control protocol that requires a server, often known as an Authentication Server, to authenticate clients attempting to connect to a network. The server usually runs a RADIUS service, which facilitates the communication between the client and the authentication server, ensuring that only authorized users gain access.

WPA2 Enterprise is a security protocol for wireless networks that enhances WPA2 by using 802.1x for authentication. This means that it also relies on an authentication server (commonly RADIUS) to manage the login and secure transactions of user credentials centrally.

RADIUS itself is a protocol that is specifically designed to provide centralized Authentication, Authorization, and Accounting (AAA) services. It operates in conjunction with 802.1x and is used in conjunction with WPA2 Enterprise to verify user credentials via a server.

The other options do not meet the criterion of requiring a server for their primary functions. For example, WPA2 Personal uses a pre-shared key for authentication and does not require a server as it supports a simpler setup suitable for smaller environments where a dedicated