An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?
A.
Disable SSID
B.
WPA
C.
MAC filtering
D.
RAS