Refer to the exhibit. Three different wireless groups of users are allowed to gain access to
the wireless LAN.
What type of security policy should be enforced for the users in the Guest group?
A.
static WEP and MAC authentication
B.
LEAP authentication
C.
primary SSID with open or no WEP authentication
D.
open authentication with WEP plus MAC authentication