A company needs to implement a secure wireless system that would require employees to
authenticate to the wireless network with their domain username and password. Which of the
following would a network administrator deploy to implement these requirements? (Select TWO).
A.
802.1q
B.
MAC address filtering
C.
WPA2 Personal
D.
WPA Enterprise
E.
802.1x