A network engineer needs to ensure that the access credentials are not exposed during the 802.1X authentication among components. Which two protocols should be configured to accomplish this task? (Choose two.)
A. PEAP
B. EAP-TLS
C. EAP-MD5
D. EAP-TTLS
E. LEAP
A & D do not expose component.
The answer should be b and d. There is no specified inner method for PEAP and LEAP and EAP-MD5 is insecure.