A systems administrator wants to implement a wireless protocol that will allow the organization to authenticate mobile devices prior to providing the user with a captive portal login.
Which of the following should the systems administrator configure?
A. L2TP with MAC filtering
C. WPA2-CCMP with PSK
D. RADIUS federation