An administrator, Ann, wants to ensure that only authorized devices are connected to a switch.
She decides to control access based on MAC addresses. Which of the following should be
configured?
A.
Implicit deny
B.
Private VLANS
C.
Flood guard
D.
Switch port security
Explanation: