While configuring a new access layer switch, the administrator, Joe, was advised that he needed
to make sure that only devices authorized to access the network would be permitted to login and
utilize resources. Which of the following should the administrator implement to ensure this
happens?
A.
Log Analysis
B.
VLAN Management
C.
Network separation
D.
802.1x
Explanation: