You are the IT security administrator for a small corporate network. You perform vulnerability scans on your network. You need to verify the security of your wireless network and your Ruckus wireless access controller.

a) Conduct a manual review of security logs
b) Verify security using the Security Evaluator
c) Perform a scan only on the wired network
d) Disconnect the wireless network for safety

Q&A Platform for Education
Platform Explore for Education