Jane, the security administrator, is having issues with unauthorized users connecting to the wireless network. For administrative reasons, she cannot implement any wireless encryption methods. Which of the following can she implement to prevent unauthorized users from connecting to the network?
A.
NIPS
B.
Disable unused ports
C.
MAC filtering
D.
WEP