A network security auditor is preparing to perform a comprehensive assessment of an 802.11ac network’s security.
What task should be performed at the beginning of the audit to maximize the auditor’s ability to expose network vulnerabilities?
A . Identify the IP subnet information for each network segment.
B . Identify the manufacturer of the wireless infrastructure hardware.
C . Identify the skill level of the wireless network security administrator(s).
D . Identify the manufacturer of the wireless intrusion prevention system.
E . Identify the wireless security solution(s) currently in use.
Answer: E