A security analyst conducted a risk assessment on an organization’s wireless network and identified a high-risk element in the implementation of data confidentially protection.
Which of the following is the BEST technical security control to mitigate this risk?
A . Switch to RADIUS technology
B . Switch to TACACS+ technology.
C . Switch to 802 IX technology
D . Switch to the WPA2 protocol.
Answer: A