Which phase uses the Extensible Authentication Protocol?
(a) Discovery
(b) Authentication
(c) Key Management
(d) Protected Data Transfer
This question was addressed to me in homework.
The origin of the question is IEEE 802.11i WLAN Security in chapter Wireless Network Security and Network Security Overview of Cryptograph & Network Security