Which of the following can be implemented to help prevent unauthorized computers from
connecting to a company’s wireless access point?
A.
Enabling MAC address filtering
B.
Enabling DNS on the wireless subnet
C.
Disabling SSID broadcast
D.
Enabling DHCP on the wireless subnet