You need to design an access control strategy for the wireless access point in the Chicago office.
Take care in your solution to address the IT manager’s concerns.
What should you do?
A.
Use EAP-TLS for authentication purposes.
B.
Use PEAP-TLS for authentication purposes.
C.
Use EAP-MS-CHAP v2 for authentication purposes.
D.
Use PEAP with MS-CHAP v2 for authentication purposes.