You work as a network administrator at Bilco Engineering, Inc. You have received instruction to start designing the configuration for the wireless network. The solution you are in the process of designing should meet the requirements of the wireless users. What should you do? (Each correct answer presents part of the solution. Choose TWO.)
A.
Make use of static wired equivalent privacy (WEP)
B.
Make use of service set identifier (SSID) broadcasts
C.
Make use of ad hoc networking
D.
Make use of IEEE 802.1x authentication
E.
Make use of Internet Authentication Service (IAS)