An administrator, Ann, wants to ensure that only authorized devices are connected to a switch. She decides to
control access based on MAC addresses. Which of the following should be configured?
A.
Implicit deny
B.
Private VLANS
C.
Flood guard
D.
Switch port security