EAP protocols
Use the Internet to research information on four different EAP protocols that are supported in WPA 2 enterprise (referenced table 9-5). Write a brief description of each and indicate the relative strength of its security. Write a couple of paragraphs on your research. Turn in assignment.