A company has discovered unauthorized devices are using its WiFi network, and it wants to harden the access point to improve security. Which of the following configurations should an analyst enable to improve security? (Choose two.)
A. RADIUS
B. EAP-PEAP
C. WPS
D. WPA-TKIP
E. SSL
F. WPA2-PSK