A corporation is not concerned about wireless use by Teleworkers. Authentication for any application first requires access via a web browser to a protected site. Given these requirements, choose the appropriate security feature to use to enforce the security policy.()
A.Authentication Proxy
B.802.1X
C.Context-Based Access Control
D.Intrusion Detection System
E.Stateful firewall