Which of the following can be implemented if a security administrator wants only certain devices connecting to the wireless network?
Which of the following controls would allow a company to reduce the exposure of sensitive systems from unmanaged devices on internal networks?