A network administrator wants to ensure that users do not connect any unauthorized devices to the company
network. Each desk needs to connect a VoIP phone and computer.
Which of the following is the BEST way to accomplish this?
A.
Enforce authentication for network devices
B.
Configure the phones on one VLAN, and computers on another
C.
Enable and configure port channels
D.
Make users sign an Acceptable use Agreement