What is the best EAP method for XYZ to implement?

Corporation XYZ just underwent a third-party security audit. The auditors have required that the
corporation implements 802.1x on its wireless network and disable all pre-shared key WLANs as
soon as possible. XYZ does not have an internal CA installed to provide server certificates today.
However, it wishes to implement an EAP method that requires clients to use server authentication
in the future. XYZ also needs an EAP method that will allow both Active Directory user
authentication and time-based tokens.
What is the best EAP method for XYZ to implement?

Corporation XYZ just underwent a third-party security audit. The auditors have required that the
corporation implements 802.1x on its wireless network and disable all pre-shared key WLANs as
soon as possible. XYZ does not have an internal CA installed to provide server certificates today.
However, it wishes to implement an EAP method that requires clients to use server authentication
in the future. XYZ also needs an EAP method that will allow both Active Directory user
authentication and time-based tokens.
What is the best EAP method for XYZ to implement?

A.
TTLS

B.
PEAP

C.
FAST

D.
TLS



Leave a Reply 0

Your email address will not be published. Required fields are marked *