A company uses WPA2-PSK. and it appears there are multiple unauthorized devices connected to the wireless network A technician suspects this is because the wireless password has been shared with unauthorized individuals.
Which of the following should the technician implement to BEST reduce the risk of this happening in the future?
A . Wireless guest isolation
B . 802.1X
C . WPS
D . MAC address blacklist
Answer: C