Which of the following would improve the security posture of the wireless network?
A security analyst is monitoring authentication exchanges over the company’s wireless network. A sample of the Wireshark output is shown below: Which of the following would improve the security posture of the wireless network?A...