Which of the following must Jane, a security administrator, implement to ensure all wired ports are authenticated before a user is allowed onto the network?
A.
Intrusion prevention system
B.
Web security gateway
C.
Network access control
D.
IP access control lists