During a recent site survey, you found a rogue wireless access point on your network. Which of the following actions should you take first to protect your network while still preserving evidence?
Run a packet sniffer to monitor traffic to and from the access point.
Connect to the access point and examine its logs for information.
Disconnect the access point from the network.
See who is connected to the access point and attempt to find the attacker.