While setting up a secure wireless corporate network, which of the following should Pete, an
administrator, avoid implementing?

A.
EAP-TLS
B.
PEAP
C.
WEP
D.
WPA
Explanation:
WEP is one of the more vulnerable security protocols. The only time to use WEP is when you
must have compatibility with older devices that do not support new encryption.