Strong security is required, but a centralized RADIUS authenticator has not been implemented.
Which two steps must you take to provide maximum security when using a pre-shared key?
(Choose two.)
A.
Change the TKIP on a weekly basis.
B.
Use a key that includes mixed-case letters, numbers, and symbols with a length greater than 10
characters.
C.
Use only with WPA and WPA2, following proper strong key guidelines.
D.
Use the longest possible WEP key in your security policy.