A government organization uses standard Wi-Fi Protected Access 2 (WPA2) to protect confidential information transmitted to a file server.
Which of the following is the IS auditor’s BEST recommendation to further strengthen security?
A . Certificate-based authentication
B . Network address translation (NAT)
C . Media access control (MAC) address filtering
D . Service set identifier (SSID) masking
Answer: D