A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission. If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?
A. Default SSID
B. MAC filtering
C. Power levels
D. Content filtering
E. Firewall