An organization wishes to enforce policies that restrict access to sensitive resources from unauthorized network segments. Which security rule should primarily be configured to manage this access?
Access control list (ACL)
MAC filtering
Content filtering
Disable unused ports