After completing the installation of a new overlay WIPS for the purpose of rogue detection and security monitoring at your corporate headquarters, what baseline function MUST be performed in order to identify the security threats?
A . Separate security profiles must be defined for network operation in different regulatory domains.
B . WLAN devices that are discovered must be classified (rogue, authorized, neighbor, etc.) and a WLAN policy must define how to classify new devices.
C . Upstream and downstream throughput thresholds must be specified to ensure that service-level agreements are being met.
D . Authorized PEAP usernames must be added to the WIPS server’s user database.
Answer: B