Which two practices help secure the configuration utilities on wireless access points from unauthorized access?
  • 1、
【正确答案】 1、B,C    
【答案解析】