A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1? (Choose two.)
A.
Configure port Fa0/1 to accept connections only from the static IP address of the server.
B.
Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
C.
Configure the MAC address of the server as a static entry associated with port Fa0/1.
D.
Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
E.
Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
F.
Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.