At the end of the lab, you drafted a WLAN __________ to mitigate the risk, threats, and vulnerabilities identified by the lab.
a. summary assessment
b. security progress report
c. security implementation plan
d. capture file