A wireless network has the following design requirements:
Authentication must not be dependent on enterprise directory service
It must allow background reconnection for mobile users
It must not depend on user certificates
Which of the following should be used in the design to meet the requirements? (Choose two.)
A. PEAP
B. PSK
C. Open systems authentication
D. EAP-TLS
E. Captive portals