A company suspects that an attacker has been attempting to gather sensitive information by intercepting traffic on its wired network. Which of the following measures is MOST effective in preventing the attacker from gaining useful information?
Encrypting the data in transit over the network.
Disabling all unused services on the network hosts.
Implementing a firewall between the wired network and external systems.
Changing the default passwords on network devices.