A company has placed a networked PC in a lobby so guests can have access to the corporate
directory.
A security concern is that someone will disconnect the directory PC and re-connect their laptop
computer and have access to the corporate network. For the port servicing the lobby, which three
configuration steps should be performed on the switch to prevent this? (Choose three.)
A.
Enable port security.
B.
Create the port as a trunk port.
C.
Create the port as an access port.
D.
Create the port as a protected port.
E.
Set the port security aging time to 0.
F.
Statically assign the MAC address to the address table.
G.
Configure the switch to discover new MAC addresses after a set time of inactivity.