A network administrator is setting up wireless access points in all the conference rooms and wants to authenticate device using PKI.
Which of the following should the administrator configure?
A . A captive portal
B . PSK
C . 802.1X
D . WPS
Answer: C