You are the IT security administrator for a small corporate network. You perform vulnerability scans on your network. You need to verify the security of your wireless network and your Ruckus wireless access controller.
a) Conduct a manual review of security logs
b) Verify security using the Security Evaluator
c) Perform a scan only on the wired network
d) Disconnect the wireless network for safety