The Chief Information Security Officer (CISO) is concerned that users could bring their personal laptops to work
and plug them directly into the network port under their desk. Which of the following should be configured on
the network switch to prevent this from happening?
A.
Access control lists
B.
Loop protection
C.
Firewall rule
D.
Port security