As a part of a large organization’s security policy, how should a wireless security professional address the problem of rogue access points?

A.
Use a WPA2-Enterprise compliant security solution with strong mutual authentication and encryption for network access of corporate devices.
B.
Hide the SSID of all legitimate APs on the network so that intruders cannot copy this parameter on rogue APs.
C.
Conduct thorough manual facility scans with spectrum analyzers to detect rogue AP RF signatures.
D.
A trained employee should install and configure a WIPS for rogue detection and response measures.
E.
Enable port security on Ethernet switch ports with a maximum of only 3 MAC addresses on each port.