Which of the following techniques can be used to mitigate the risk of an on-site attacker from
connecting to an unused network port and gaining full access to the network? (Choose three.)
A.
Port Security
B.
IPSec Encryption
C.
Network Admission Control (NAC)
D.
802.1q Port Based Authentication
E.
802.1x Port Based Authentication
F.
Intrusion Detection System (IDS)