What key assumption made by EAP can be remedied by using PEAP?
A. EAP assumes that LEAP will replace TKIP, ensuring that authentication will occur.
B. EAP originally assumed the use of physically isolated channels and is usually not encrypted.
C. There are no TLS implementations available using EAP.
D. EAP does not allow additional authentication methods, and PEAP adds additional methods.
Answer: B. EAP originally assumed the use of physically isolated channels and is usually not encrypted.
You might also like to view...
Which of the following job functions is responsible for making key decisions about software and its business requirements?
A. Developers B. Project managers C. Business owners D. Support operations
You would use a(n) ________ report when you want to summarize and analyze related data, especially for a long list of values to sum
Fill in the blank(s) with correct word
Symmetric key encryptions ensure confidentiality and data ____.
A. integrity B. privacy C. availability D. repudiation
When a class is presented to run in a JVM, the ____ finds the class, loads the byte codes, performs verification, executes its main method, and then loads any supplemental classes.
A. ClassProfile B. ClassHandler C. ClassLoader D. ClassBooting