A security analyst is hardening a large-scale wireless network.
The primary requirements are the following:
* Must use authentication through EAP-TLS certificates
* Must use an AAA server
* Must use the most secure encryption protocol
Given these requirements, which of the following should the analyst implement and recommend? (Select TWO).
A . 802.1X
B . 802.3
C . LDAP
D . TKIP
E . CCMP
F . WPA2-PSK
Answer: A, F