A company is hardening their network and a network administrator is tasked with configuring a switch prior to deployment to improve security. Which of the following actions should the administrator take to reduce potential attack vectors?
Move the management interfaces and unused ports to an unused or black hole VLAN
Assign the native interface to the upper limit of available numbers
Activate trunking on all interfaces as a preventative strategy
Disable protocol-based network segmentation features entirely