Matt, a systems security engineer, is determining which credential-type authentication to use within a planned 802.1x deployment. He is looking for a method that does not require a client certificate, has a server side certificate, and uses TLS tunnels for encryption. Which credentialtype authentication method BEST fits these requirements?

A. EAP-TLS
B. EAP-FAST
C. PEAP-CHAP
D. PEAP-MSCHAPv2


Answer: D. PEAP-MSCHAPv2

Computer Science & Information Technology

You might also like to view...

The ____________________ property determines whether a GUI object is displayed on the Windows Form object.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

?A combination key can also be called a _____.

A. ?composite key B. ?concatenated key C. ?foreign key D. ?multivalued key

Computer Science & Information Technology

The ____ method is used to clear a setInterval() method call.

A. exitInterval() B. stopInterval() C. clearInterval() D. cancelInterval()

Computer Science & Information Technology

Cloud computing is a new way to access software that uses satellite technology to download applications to end users.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology