Which of the following is an authentication protocol that can be used for users in the field?
A . WEP
B . WPA2
C . RADIUS
D . TKIP
Answer: C
Which of the following is an authentication protocol that can be used for users in the field?
A . WEP
B . WPA2
C . RADIUS
D . TKIP
Answer: C