Jane, a security administrator, needs to implement a secure wireless authentication method
that uses a remote RADIUS server for authentication. Which of the following is an
authentication method Jane should use?
A.
WPA2-PSK
B.
WEP-PSK
C.
CCMP
D.
LEAP