Your enterprise customer is considering adding a VoWLAN service to their existing wireless
deployment. The VoWLAN wireless phones have limited power and processing capabilities. The IT
manager insists that, while the authentication protocol must preserve battery and processing power,
it must also be secure. Assume that the wireless phones and AAA infrastructure support all the EAP
methods listed within the options. Which one of the below 802.1X EAP authentication protocols
would you recommend to your customer?
A.
EAP-FAST
B.
EAP-TLS
C.
EAP-TTLS
D.
LEAP