Jeff, a customer, has a wireless network and has reported that the network traffic from the wireless access points seems high compared to the limited number of wireless devices used. Jeff believes that other non-employees are using the wireless network to access the Internet. Which of the following could be used to limit the access to the wireless network? (Select TWO).
A. WPA encryption
B. Changing wireless channels
C. MAC filtering
D. Changing wireless speed standards
E. SSID disable