An administrator is securing an enterprise wireless network to prevent unauthorized access. They decide to use an authentication method that requires a username and password for network access, as well as a certificate installed on the device. Which configuration should be implemented to achieve this level of security?
WPA2-Enterprise with 802.1X
WPA2-Personal with preshared keys
Captive portal with social media login
WEP with MAC filtering