Perfect World Inc., provides its sales managers access to the company’s network from remote
locations. The sales managers use laptops to connect to the network. For security purposes, the
company’s management wants the sales managers to log on to the network using smart cards
over a remote connection. Which of the following authentication protocols should be used to
accomplish this?
A.
Challenge Handshake Authentication Protocol (CHAP)
B.
Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)
C.
Open Shortest Path First (OSPF)
D.
Extensible Authentication Protocol (EAP)