In the network environment, security becomes more and more important. The security of
competitor products may easily get threatened by a variety of attacks especially when they
own some feature. Choose this feature from the following options
A.
user-based identification
B.
support for Triple Data Encryption Standard, media interface connectors, and other
security features
C.
support for only the basic Wired Equivalent Privacy
D.
FIPS 140-2 compliance