Which of the following BEST describes the proper method and reason to implement port security?
A.
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
B.
Apply a security control which ties specific networks to end-device IP addresses and prevents new devices from being connected to the network.
C.
Apply a security control which ties specific ports to end-device MAC addresses and prevents all devices from being connected to the network.
D.
Apply a security control which ties specific ports to end-device IP addresses and prevents mobile devices from being connected to the network.