Which of the following is used in conjunction with PEAP to provide mutual authentication between peers?
Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?