Which of the following should be configured to prevent unauthorized devices from connecting to the network?
Which of the following provides the highest degree of protection from unauthorized wired network access?