A company has placed a networked PC in a lobby so guests can have access to the corporate
directory. A security concern is that someone will disconnect the directory PC and re-connect their
laptop computer and have access to the corporate network. For the port servicing the lobby, which
three configuration steps should be performed on the switch to prevent this?
(Choose three.)
A.
Enable port security.
B.
Create the port as a trunk port.
C.
Create the port as an access port.
D.
Create the port as a protected port.
E.
Set the port security aging time to 0.
F.
Statically assign the MAC address to the address table.
G.
Configure the switch to discover new MAC addresses after a set time of inactivity.
Explanation: