Matt, a systems security engineer, is determining which credential-type authentication to use within a planned 802.1x deployment. He is looking for a method that does not require a client certificate, has a server side certificate, and uses TLS tunnels for encryption. Which credentialtype authentication method BEST fits these requirements?
A. EAP-TLS
B. EAP-FAST
C. PEAP-CHAP
D. PEAP-MSCHAPv2
Answer: D. PEAP-MSCHAPv2
Computer Science & Information Technology
You might also like to view...
The ____________________ property determines whether a GUI object is displayed on the Windows Form object.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
?A combination key can also be called a _____.
A. ?composite key B. ?concatenated key C. ?foreign key D. ?multivalued key
Computer Science & Information Technology
The ____ method is used to clear a setInterval() method call.
A. exitInterval() B. stopInterval() C. clearInterval() D. cancelInterval()
Computer Science & Information Technology
Cloud computing is a new way to access software that uses satellite technology to download applications to end users.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology