Which of the following is the BEST way of managing risk inherent to wireless network?
A. Enabling auditing on every host that connects to a wireless network
B. Require private, key-based encryption to connect to the wireless network
C. Require that every host that connect to this network have a well-tested recovery plan
D. Enable auditing on every connection to the wireless network
A. Enabling auditing on every host that connects to a wireless network
B. Require private, key-based encryption to connect to the wireless network
C. Require that every host that connect to this network have a well-tested recovery plan
D. Enable auditing on every connection to the wireless network