Which of the following methods are capable of operating in wireless networks? Each correct answer represents a complete solution. Choose all that apply.

A.
EAP-TLS
B.
LEAP
C.
PEAP
D.
EAP-TTLS
Explanation:
The methods that are capable of operating in wireless networks are as follows:
LEAP: The Lightweight Extensible Authentication Protocol (LEAP) is a proprietary EAP method developed by Cisco Systems prior to the IEEE ratification of the 802.11i security standard. There is no native support for LEAP in any Windows operating system, but it is widely supported by third- party client software most commonly included with WLAN (wireless LAN) devices. Due to the wide adoption of LEAP in the networking industry, many other WLAN vendors claim support for LEAP. EAP-TLS: EAP-Transport Layer Security (EAP-TLS) is an IETF open standard and is well- supported among wireless vendors. The security of the TLS protocol is strong, provided the user understands potential warnings about false credentials. It uses PKI to secure communication to a RADIUS authentication server or another type of authentication server. EAP-TTLS: EAP-Tunneled Transport Layer Security (EAP-TTLS) is an EAP protocol that extends TLS. It is widely supported across platforms; although there is no native OS support for this EAP protocol in Microsoft Windows, it requires the installation of small extra
programs such as SecureW2. EAP-TTLS offers very good security. The client can but does not have to be authenticated via a CA-signed PKI certificate to the server. This greatly simplifies the setup procedure, as a certificate does not need to be installed on every client. After the server is securely authenticated to the client via its CA certificate and optionally the client to the server, the server can then use the established secure connection ("tunnel") to authenticate the client. Answer option C is incorrect. PEAP is not a method operated in wireless networks.