Which of the following is an weak implementation of EAP? A. EAP-FAST B. LEAP C. PEAP D. EAP-TLS Solution B. LEAP is considered a weak version of EAP. It makes use if a modified version of CHAP and as such does not adequately protect the authentication process. Answers A, C, and D would all be examples of strong versions of EAP. These stronger options include EAP-FAST, PEAP, or EAP-TLS.