Which of the following is used in conjunction with PEAP to provide mutual authentication between peers?
Which of the following should be performed if a smartphone is lost to ensure no data can be retrieved from it?