Jeff, a customer, has a wireless network and has reported that the network traffic from the wireless
access points seems high compared to the limited number of wireless devices used. Jeff believes that
other non-employees are using the wireless network to access the Internet. Which of the following
could be used to limit the access to the wireless network? (Select TWO).

A.
WPA encryption
B.
Changing wireless channels
C.
MAC filtering
D.
Changing wireless speed standards
E.
SSID disable