Jane, the security administrator, is having issues with unauthorized users connecting to the
wireless network. For administrative reasons, she cannot implement any wireless encryption
methods. Which of the following can she implement to prevent unauthorized users from
connecting to the network?
A.
NIPS
B.
Disable unused ports
C.
MAC filtering
D.
WEP