Which authentication method is commonly used for more-secure wireless networks?

A. PPP
B. EAP-PSK
C. EAP-TLS
D. LEAP


Answer: C

Computer Science & Information Technology

You might also like to view...

Discuss why the effectiveness of security activities can be hard for decision makers to assess.

What will be an ideal response?

Computer Science & Information Technology

________ searches use logical operators to join words you are searching for

Fill in the blank(s) with correct word

Computer Science & Information Technology

?Tags that are included within other tags are called ____ tags.

A. ?enclosed B. ?nested C. ?looped D. ?cocooned

Computer Science & Information Technology

For monitoring the physical locations of employees, video cameras are often used, but another possibility is the use of ____.

A. proximity cards B. presence technology C. face recognition D. video cards

Computer Science & Information Technology