At an organization, unauthorized users have been accessing network resources via unused
network wall jacks. Which of the following would be used to stop unauthorized access?
A.
Configure an access list.
B.
Configure spanning tree protocol.
C.
Configure port security.
D.
Configure loop protection.