Ann, a security administrator, wants to limit access to the wireless network. Which of the following can be used
to do this without using certificates?
A.
Employ EAP-TLS
B.
Employ PEAP on all laptops
C.
Enable MAC filtering
D.
Disable SSID broadcasting