Scenario: The Extensible Authentication Protocol (EAP) fits inside of the Point-to-Point Protocol footprint and is designed to give security administrators a type of framework for implementing a variety of authentication methods. By using EAP, all sorts of authentication systems can be used together to build a cohesive authentication scheme. The IEEE 802.1X standard defines how EAP is used on a LAN. For this Assignment, discuss how the 802.1X authentication standard and EAP can be used to mitigate at least three authentication security risks. Instructions: Following the process described in the “Conducting Research”, write a 5–6-page research paper that examines the role of the IEEE 802.1X standard and EAP in securely creating effective schemes of authentication in depth. Be sure to expand on how the various methods effectively work together and include a minimum of three appropriate authentication methods that would be used in a comprehensive authentication scheme, along with the related authentication security risks that they mitigate.