You are a network administrator at Certkiller .com. The size of Certkiller .com’s
WLAN is growing rapidly. Which two of the following tasks must be carried out to maintain
consistent network security? (Select TWO.)
A.
Use Role Based Access Control (RBAC) to assign security policies to users
B.
Update the WLAN architecture to support autonomous APs managed by WNMS
C.
Configure APs to load their firmware from a TFTP server during initialization
D.
Include the WLAN in a change management program
E.
Create and maintain a security checklist for equipment staging