Kim, an administrator, has detected a worm spreading throughout the network. Which of the following ACLs can be configured on a Layer2 switch port to mitigate the attack?
A.
Drop 19:21:68:10:20:00
B.
Permit ::1/32
C.
Permit A0:H1:B0:90:1D:6C
D.
Drop 192.168.10.20