Which of the following MUST be used to implement a wireless network supporting EAP-TTLS?
A.
Kerberos
B.
Two factor authentication
C.
CHAP
D.
PKI
Which of the following MUST be used to implement a wireless network supporting EAP-TTLS?
Which of the following MUST be used to implement a wireless network supporting EAP-TTLS?
A.
Kerberos
B.
Two factor authentication
C.
CHAP
D.
PKI