Which of the following can be implemented to help prevent unauthorized computers from connecting to a company’s wireless access point?
A. Enabling MAC address filtering
B. Enabling DNS on the wireless subnet
C. Disabling SSID broadcast
D. Enabling DHCP on the wireless subnet