You need to design an authentication method for the portable computer used on the network. The solution you are designing should be employed to provide for the desired level of security the remote portable computer?
A.
MS-CHAP v2.
B.
Two-factor authentication.
C.
IPSec authentication.
D.
802.1x authentication.