Jane, a security administrator, needs to implement a secure wireless authentication method that
uses a remote RADIUS server for authentication. Which of the following authentication methods
should Jane use?

A.
WPA2-PSK
B.
WEP-PSK
C.
CCMP
D.
LEAP
Explanation: