Which protection strategy can be applied to the security zone containing switches and routers?

A.
Use two factor authentications for network access
B.
Implementing secured remote access
C.
Masking based on source FCID
D.
Using E_port authentication