A company wants to implement a wireless network with the following requirements:
All wireless users will have a unique credential.
User certificates will not be required for authentication.
The company’s AAA infrastructure must be utilized. Local hosts should not store authentication tokens.
Which of the following should be used in the design to meet the requirements?
A. EAP-TLS
B. WPS
C. PSK
D. PEAP