Ports can be secured through disabling unused interfaces, using _______________, and through IEEE 802.1x.
a. media access control (MAC) limiting and filtering
b. virtual private network (VPN) tunneling
c. packet sniffers
d. virtual local area networks (VLANs)
Answer: A