An analyst wants to implement a more secure wireless authentication for office access points. Which of the following technologies allows for encrypted authentication of wireless clients over TLS?

A. PEAP
B. EAP
C. WPA2
D. RADIUS


Answer: A. PEAP

Computer Science & Information Technology

You might also like to view...

Describe the three generations of DBMSs.

What will be an ideal response?

Computer Science & Information Technology

AES is a block cipher that translates fixed-size blocks of unencrypted data into corresponding fixed-sized blocks of encrypted data.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Use the ____ style for side headings of reports.

A. Heading 1 B. Heading 2 C. Subtitle D. Title

Computer Science & Information Technology

Conversion specifiers e and E always print exactly __________ to the left of the decimal point.

a) zero digits b) one digit c) two digits d) three digits

Computer Science & Information Technology