A、EAP-TLS B、EAP-TTLS C、PEAP D、LEAP
A、Open authentication B、Pre-Shared Key authentication C、Shared Key authentication D、MAC authentication
A、網(wǎng)絡(luò)竊聽 B、通信量分析 C、身份假冒 D、中間人攻擊