After evaluating the risks of a rogue wireless network, Mark Lee decides that he must convince the IT director that the company needs a wireless network security policy even if they do not want to sponsor a wireless network. Which of the following strategies would reduce the risk of a security breech resulting from a rogue wireless network? (Choose all that apply.)
a. Deploying an IT-managed WAP with WEP encryption and 802.1X authentication.
b. Publishing instructions for other employees to access the current employee-managed WAP.
c. Educating internal employees about the risks associated with wireless networks.
d. Publishing a wireless network security policy forbidding employee-managed WAPs.
e. Deploying an IT-managed WAP using open network authentication without encryption.
f. Publishing a wireless network security policy allowing employee-managed WAPs, as long as they have authentication and encryption enabled.