Ann a new security specialist is attempting to access the internet using the company’s open wireless network. The wireless network is not encrypted: however, once associated, ANN cannot access the internet or other company resources. In an attempt to troubleshoot, she scans the wireless network with NMAP, discovering the only other device on the wireless network is a firewall. Which of the following BEST describes the company’s wireless network solution?
A. The company uses VPN to authenticate and encrypt wireless connections and traffic
B. The company’s wireless access point is being spoofed
C. The company’s wireless network is unprotected and should be configured with WPA2
D. The company is only using wireless for internet traffic so it does not need additional encryption