A network technician has recently discovered rogue devices on their network and wishes to
implement a security feature that will prevent this from occurring. Which of the following will
prevent unauthorized devices from connecting to a network switch?
A.
Implement 802.11i on all switches in the network.
B.
Implement port security on all computers in the company.
C.
Implement port security on all switches in the network.
D.
Implement rules on the firewall to block unknown devices.