You need to design an authentication solution for wireless network access. Your solution must meet business and technical requirements. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A.
Deploy an offline enterprise root CA in the corp.woodgrovebank.com domain. Deploy subordinate enterprise root CAs in each child domain. Install Internet Authentication Service (IAS) on one member server in the la.corp.woodgrovebank.com domain and on one member server in the den.corp. woodgrovebank.com domain.
B.
Deploy an enterprise root CA in each domain. Install Internet Authentication Service (IAS) on a member server in the corp.woodgrovebank.com domain. Install the Routing and Remote Access service on a member server in each child domain, and configure these servers as RADIUS clients.
C.
Enroll and deploy user certificates to all administrators in each domain. Enroll and deploy computer certificates to all portable computers that have wireless network adapters. Configure each portable computer to use Protected EAP (PEAP) for authentication.
D.
Enroll and deploy computer certificates to all portable computers that have wireless network adapters. Configure each portable computer to use EAP-MS-CHAP v2 for authentication.
Configure each portable computer to connect to the Internet Authentication Service (IAS) server.