Which of the following BEST describes the proper method and reason to implement port security?
A.
Apply a security control which ties specific ports to end-device MAC addresses and prevents
additional devices from being connected to the network.
B.
Apply a security control which ties specific networks to end-device IP addresses and prevents
new devices from being connected to the network.
C.
Apply a security control which ties specific ports to end-device MAC addresses and prevents all
devices from being connected to the network.
D.
Apply a security control which ties specific ports to end-device IP addresses and prevents
mobile devices from being connected to the network.
Explanation: