A technician wants to prevent an unauthorized host from connecting to the network via Ethernet. Which of the following is a Layer 2 access control
the technician should implement?
A. Access control lists
B. Captive portal
C. WPA2
D. Port security