You are implementing basic switch security best practices. Which of these is a tactic that you
can use to mitigate compromises from being launched through the switch?
A.
Make all ports private VLAN ports.
B.
Place all unused ports in native VLAN 1 until needed.
C.
Proactively configure unused switch ports as access ports.
D.
Disable Cisco Discovery Protocol globally.