A network administrator is responsible for configuring a newly-installed switch to heighten its security posture. Understanding the risks associated with the initial setup, which action should the administrator take to protect against attacks that exploit switch default configurations?
Apply stringent access policies on all new switch ports to limit cross-network communications.
Configure all unused switch ports to dynamically decide whether to use trunk or access mode based on connected device type.
Implement strict segmentation policies that separate switch ports into various subnetworks based on departmental requirements.
Reassign all unused switch ports to an isolated VLAN that serves no hosts and is configured to not forward traffic.