_____ was created as a more secure alternative than the weak Challenge Handshake Authentication Protocol (CHAP) and Password Authentication Protocol (PAP).

_____ was created as a more secure alternative than the weak Challenge Handshake Authentication Protocol (CHAP) and Password Authentication Protocol (PAP).



a. Temporal Key Integrity Protocol (TKIP)
b. Advanced Encryption Standard (AES)
c. Protected EAP (PEAP)
d. Extensible Authentication Protocol (EAP)



Answer: D


Learn More :

Network Security

Learn More Multiple Choice Question :