Different vendors have implemented various solutions to overcome the vulnerabilities of WEP. Which of the following provides an incorrect mapping between these solutions and their characteristics?
A.
LEAP requires a PKI.
B.
PEAP only requires the server to authenticate using a digital certificate.
C.
EAP-TLS requires both the wireless device and server to authenticate using digital certificates.
D.
PEAP requires the user to provide a password.
Explanation:
Cisco uses a purely password-based authentication framework called
Lightweight Extensible Authentication Protocol (LEAP). Other vendors, including
Microsoft, use EAP and Transport Layer Security (EAP-TLS), which carries out
authentication through digital certificates. And yet another choice is Protective
EAP (PEAP), where only the server uses a digital certificate.