There are a number of possible EAP exchanges that can be used during authentication phase. Typically the message flow between the STA and AP employs the _________ protocol.
(a) RADUIS
(b) EAPOL
(c) TKIP
(d) KSN
This question was addressed to me during a job interview.
The doubt is from Overview topic in section Wireless Network Security and Network Security Overview of Cryptograph & Network Security