Joe noticed that there is a larger than normal account of network on the printer VLAN of his
organization, causing users to have to wait a long time for a print job. Upon investigation Joe
discovers that printers were ordered and added to the network without his knowledge. Which of
the following will reduce the risk of this occurring again in the future?

A.
Log analysis
B.
Loop protection
C.
Access control list
D.
Rule-based management