An organization implemented a method of wireless security that requires both a user and the user's computer to be in specific managed groups on the server in order to connect to Wi-Fi. Which of the following wireless security methods BEST describes what this organization implemented?
A. TKIP
B. RADIUS
C. WPA2
D. AES
A. TKIP
B. RADIUS
C. WPA2
D. AES