A network administrator wants to ensure that users do not connect any unauthorized devices to the company
network. Each desk needs to connect a VoIP phone and computer.
Which of the following is the BEST way to accomplish this?
Enforce authentication for network devices
Configure the phones on one VLAN, and computers on another
Enable and configure port channels
Make users sign an Acceptable use Agreement