A network administrator must ensure that both the server and the client are authenticated to the
wireless system before access is granted. Which of the following should be implemented to meet
this requirement?
A.
EAP-PEAP
B.
MAC ACL
C.
EAP-TTLS
D.
MS-CHAPv2
Explanation:
Extensible Authentication Protocol, or EAP, is an authentication framework frequently used in
wireless networks and Point-to-Point connections. EAP is an authentication framework providing
for the transport and usage of keying material and parameters generated by EAP methods.