Which of these is a tactic that you can useto mitigate compromises from being launched through the switch?