Question 18 of 240
Prev QuestionNext Question


Corporation XYZ just underwent a third-party security audit.

The auditors have required that the corporation implements 802.1x on its wireless network and disable all pre-shared key WLANs as soon as possible.

XYZ does not have an internal CA installed to provide server certificates today.

However, it wishes to implement an EAP method that requires clients to use server authentication in the future.

XYZ also needs an EAP method that will allow both Active Directory user authentication and time-based tokens.

What is the best EAP method for XYZ to implement?


Prev QuestionNext Question