_____ was created as a more secure alternative than the weak Challenge Handshake Authentication Protocol (CHAP) and Password Authentication Protocol (PAP).
a. Temporal Key Integrity Protocol (TKIP)
b. Advanced Encryption Standard (AES)
c. Protected EAP (PEAP)
d. Extensible Authentication Protocol (EAP)
Answer: D