Problem
Give a brief description of the method you would use to conduct a network scan in the case of mobile/wireless devices. Make sure to outline the scanning process, be specific about what you're searching for, and end with a list of things to do if a malicious device or connection is found.