C. Enable Mobility Encryption on the network.
Here’s why:
Mobility Encryption: Enabling mobility encryption ensures that the data and control traffic exchanged between controllers in a mobility group is encrypted. This is critical for maintaining high security, especially in environments where sensitive information is transmitted.
MIC Authentication: While MIC (Message Integrity Check) authentication is important for ensuring the integrity of messages exchanged between mobility group members, it does not provide encryption. MIC alone might not be sufficient for the high-security requirements of a government agency.
Mobility Group Names: Using a different group name for each mobility member or a complex group name can help with organizational clarity and might add a layer of security through obscurity. However, these measures are not substitutes for proper encryption mechanisms.