You work as a network administrator at Bilco Engineering, Inc. You have received instruction recently to start the design that includes features that meet the written security policy requirements for the Bilco Engineering, Inc. network. You are required to select which of the authentication protocols should be used for wireless connection clients in the design. What should you do? (Each correct answer presents part of the solution. Choose TWO.)
A.
Make use of a VPN account.
B.
Make use of an IAS server.
C.
Make use of WEP.
D.
Make use of IEEE 802.1x.
E.
Make use of IPSec policies.