A. It requires that applications request access before being allowed to send traffic on the network.
B. It generates a new MAC address for each network you connect to.
C. It prohibits non-App Store applications from providing location-based suggestions.
D. It restricts MAC addresses to prevent unauthorized devices from connecting to your network.