Refer to the exhibit. Which Catalyst switch configuration would protect a customer network from possible disruption in the case in which an unauthorized switch is added to the network?
A.
Certkiller 0#show running-configuration!hostname Certkiller 0!no spanning-tree optimize bpdu transmissionspanning-tree extend system-id!interface FastEthernet0/1switchport port-security violation restrict!
B.
Certkiller 0#show running-configuration!hostname Certkiller 0!no spanning-tree optimize bpdu transmissionspanning-tree extend system-id!interface FastEthernet0/1switchport protected!
C.
Certkiller 0#show running-configuration!hostname Certkiller 0!no spanning-tree optimize bpdu transmissionspanning-tree extend system-id!interface FastEthernet0/1switchport mode access!
D.
Certkiller 0#show running-configuration!hostname Certkiller 0!spanning-tree portfast bpduguard defaultno spanning-tree optimize bpdu transmissionspanning-tree extend system-id!interface FastEthernet0/1spanning-tree guard root!