Several users are reporting connectivity issues with their laptops. Upon further investigation, the network
technician identifies that their laptops have been attacked from a specific IP address outside of the network.
Which of the following would need to be configured to prevent any further attacks from that IP address?
A.
Port security
B.
IDS
C.
Firewall rules
D.
Switch VLAN assignments