At an organization, unauthorized users have been accessing network resources via unused network wall jacks. Which of the following would be used to stop unauthorized access?

At an organization, unauthorized users have been accessing network resources via unused network wall jacks. Which of the following would be used to stop unauthorized access?




A. Configure an access list.
B. Configure spanning tree protocol.
C. Configure port security.
D. Configure loop protection.


Answer: C


Learn More :