There are a number of possible EAP exchanges that can be used during authentication phase. Typically the message flow between the STA and AP employs the ___________ protocol.
(a) RADUIS
(b) EAPOL
(c) TKIP
(d) KSN
I have been asked this question in an interview for internship.
My doubt stems from IEEE 802.11i WLAN Security in section Wireless Network Security and Network Security Overview of Cryptograph & Network Security