You need to design a method to protect traffic on the wireless networks. Your solution must meet the requirements of the chief security officer. What should you do?
A.
Configure the wireless access points in Denver and in Dallas to filter unauthorized Media Access Control (MAC) addresses.
B.
Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points use.
C.
Create a Group Policy object (GPO) and link it to the Denver OU and to the Dallas OU.
Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networks.
D.
Create a Group Policy object (GPO) and link it to the Denver OU and to the Dallas OU.
Create a wireless network policy and enable data encryption and dynamic key assignment for the Denver and the Dallas networks.