Ann a security administrator wants a limit access to the wireless network. Which of the following
can be used to do this without using certificates?

A.
Employ EPA-TLS
B.
Employ PEAP on all laptops
C.
Enable MAC filtering
D.
Disable SSID broadcasting