A security manager has noticed several unrecognized devices connecting to the company’s internal wireless network. Only company-issued devices should be
connected to the network. Which of the following controls should be implemented to prevent the unauthorized devices from connecting to the wireless network?
(Select TWO).

A.
MAC filtering
B.
Create a separate wireless VLAN
C.
Implement 802.11n
D.
Enable WPA2
E.
Configure DHCP reservations