A network administrator is tasked with hardening the security of the company's network devices. Which of the following actions BEST aligns with the principle of reducing the attack surface by managing device configurations?
Disable all unused ports on network switches and routers
Implement port mirroring to monitor data flows
Harmonize traffic rates across all ports
Encrypt all management traffic to devices
Enable additional services for remote management