You work as a network administrator at A2B Aviation. You have received instruction to start designing an authentication method that will provide the required level of security. The authentication solution you are busy designing should meet the requirements of A2B Aviation for remote computers.
What should you do?
A.
Use Two-factor authentication
B.
Use VPNs that require using L2TP/IPSec
C.
Use IPSec authentication
D.
Use IEEE 802.1x authentication