A security analyst needs to harden access to a network. One of the requirements is to authenticate users with smart cards. Which of the following should the analyst enable to best meet this requirement?
A. CHAP
B. PEAP
C. MS-CHAPv2
D. EAP-TLS
A. CHAP
B. PEAP
C. MS-CHAPv2
D. EAP-TLS