The organization just installed a handful of wireless access points (WAP) in the main facility. Given the alternatives of using various security encryption capabilities of the devices, if the default security of basic encryption was used upon rollout of the devices, how would you categorize the situation using the risk management matrix and the four strategies used? Explain each category of accept, avoid, share and control for these new devices outfitted with the default security option.