you are a contractor that has agreed to implement a new remote access solution based on a windows server 2016 system for a client. the customer wants to purchase and install a smart card system to provide a high level of security to the implementation. which of the following authentication protocols are you most likely to recommend to the client?

Respuesta :

EAP. Extending the authentication techniques employed by the Point-to-Point Protocol is the Extensible Authentication Protocol (EAP), a protocol for wireless networks.

What is EAP based authentication?

  • Only users who have an authentication key or password can access a protected portal using EAP techniques. These techniques restrict the number of users and aid in avoiding network congestion, resulting in faster and more secure networks.
  • EAP techniques can help organisations conform to particular privacy requirements and corporate policies.
  • To provide a safe method of sending identifying information to provide network authentication, EAP is utilised on encrypted networks.
  • It supports a variety of authentication techniques, such as public key encryption, smart cards, certificates, token cards, and one-time passwords.
  • There are more than 40 EAP techniques, including several widely used ones that are frequently referred to as inner techniques or tunnelled EAP techniques.

To learn more about EAP refer :

https://brainly.com/question/16014287

#SPJ4