A security analyst is specifying requirements for a wireless network. The analyst must explain the security features provided by various architecture choices.
Which of the following is provided by PEAP, EAP-TLS, and EAP-TTLS?
A . Key rotation
B . Mutual authentication
C . Secure hashing
D . Certificate pinning
Answer: B