An administrator, Ann, wants to ensure that only authorized devices are connected to a switch. She
decides to control access based on MAC addresses. Which of the following should be configured?

A.
Implicit deny
B.
Private VLANS
C.
Flood guard
D.
Switch port security