Different vendors have implemented various solutions to overcome the vulnerabilities of WEP. Which of the following provides an incorrect mapping between these solutions and their characteristics?

A.
LEAP requires a PKI.
B.
PEAP only requires the server to authenticate using a digital certificate.
C.
EAP-TLS requires both the wireless device and server to authenticate using digital certificates.
D.
PEAP requires the user to provide a password.
Explanation:
Cisco uses a purely password-based authentication framework called
Lightweight Extensible Authentication Protocol (LEAP). Other vendors, including
Microsoft, use EAP and Transport Layer Security (EAP-TLS), which carries out
authentication through digital certificates. And yet another choice is Protective
EAP (PEAP), where only the server uses a digital certificate.
I have the same idea. A
0
0
is this part of the new question database?
0
0
really need explanation.
But i think C would be correct.
0
0