You are implementing basic switch security best practices. Which of these is a tactic that you can useto
mitigate compromises from being launched through the switch?
A.
Make all ports private VLAN ports
B.
Place all unused ports in native VLAN 1 until needed
C.
Proactively configure unused switch ports as access ports
D.
Disable Cisco Discovery Protocol