What key assumption made by EAP can be remedied by using PEAP?

A. EAP assumes that LEAP will replace TKIP, ensuring that authentication will occur.
B. EAP originally assumed the use of physically isolated channels and is usually not encrypted.
C. There are no TLS implementations available using EAP.
D. EAP does not allow additional authentication methods, and PEAP adds additional methods.


Answer: B. EAP originally assumed the use of physically isolated channels and is usually not encrypted.

Computer Science & Information Technology

You might also like to view...

Which of the following job functions is responsible for making key decisions about software and its business requirements?

A. Developers B. Project managers C. Business owners D. Support operations

Computer Science & Information Technology

You would use a(n) ________ report when you want to summarize and analyze related data, especially for a long list of values to sum

Fill in the blank(s) with correct word

Computer Science & Information Technology

Symmetric key encryptions ensure confidentiality and data ____.

A. integrity B. privacy C. availability D. repudiation

Computer Science & Information Technology

When a class is presented to run in a JVM, the ____ finds the class, loads the byte codes, performs verification, executes its main method, and then loads any supplemental classes.

A. ClassProfile B. ClassHandler C. ClassLoader D. ClassBooting

Computer Science & Information Technology