In the network environment, security becomes more and more important. The security of
competitor products may easily get threatened by a variety of attacks especially when they
own some feature. Choose this feature from the following options
A.
 user-based identification 
B.
 support for Triple Data Encryption Standard, media interface connectors, and other 
security features
C.
 support for only the basic Wired Equivalent Privacy
D.
 FIPS 140-2 compliance