Computer users who use wireless connectivity at hotspots to access the Internet should use ___________ to protect their wireless-enabled computer from inbound intrusions.
A.
The HTTPS protocol
B.
WPA2 security
C.
Personal firewall software
D.
A POP3 email client
E.
MAC filters