You are concerned that wireless access points may have been deployed within your organization without authorization. what should you do? (select two. each response is a complete solution.)

a. Conduct a site survey.
b. Check the MAC addresses of devices connected to your wired switch.
c. Implement an intrusion detection system (IDS).
d. Implement an intrusion prevention system (IPS).
e. Implement a network access control (NAC) solution.