Answer:
PEAP is the correct answer to the given question .
Explanation:
The PEAP are implemented to meet the demands because it is very much identical to the EAP-TTLS design also it includes the server-side PKI authentication .
- The main objective of PEAP is to establish the protected TLS tunnel for protecting the authentication process, as well as a server-side encryption authentication.
- The PEAP is also used for validating the application it validating her process with the help of the TLS Tunnel encryption between the user and the verification.
- All the other options are not suitable for the to meet the requirements of the design that's why these are incorrect option .