When implementing a secure wireless network, which of the following supports authentication and
authorization for individual client endpoints?

A.
Temporal Key Integrity Protocol (TKIP)
B.
Wi-Fi Protected Access (WPA) Pre-Shared Key (PSK)
C.
Wi-Fi Protected Access 2 (WPA2) Enterprise
D.
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)