After embracing a BYOD policy, a company is faced with new security challenges from unmanaged mobile devices and laptops. The company-s IT department has seen a large number of the following incidents:
Duplicate IP addresses
Rogue
network devices
Infected systems probing the company-s network
Which of the following should be implemented to remediate the above issues? (Choose two.)
A. Port security
B. Route protection
C. NAC
D. HIPS
E. NIDS