A network technician has discovered a rogue
access point under an empty cubicle desk. Which of the following should the technician perform to ensure another cannot be placed on the network?
A. Disable unused ports on switches
B. Enable DHCP guard to detect rogue servers
C. Configure WPA2 on all ac
cess points
D. Use TACACS+ authentication