Which of the following actions should be performed upon discovering an unauthorized wireless access point attached to a network?
A.
Unplug the Ethernet cable from the wireless access point.
B.
Enable MAC filtering on the wireless access point.
C.
Change the SSID on the wireless access point.
D.
Run a ping against the wireless access point.