A company has remote workers with laptops that house sensitive data. Which of the following can be
implemented to recover the laptops if they are lost?
A security administrator is setting up a corporate wireless network using WPA2 with CCMP but does not want
to use PSK for authentication. Which of the following could be used to support 802.1x authentication?