Strong security is required, but a centralized RADIUS authenticator has not been implemented. Which two steps must you take to provide maximumsecurity when using a pre-shared key? (Choose two.)
A. Change the TKIP on a weekly basis.
B. Use a key that includes mixed-case letters, numbers, and symbols with a length greater than 10 characters.
C. Use only with WPA and WPA2, following proper strong key guidelines.
D. Use the longest possible WEP key in your security policy.