What are two recommendations for protecting network ports from being exploited when located in an office space outside of an IT closet? (Choose two)
A . shut down unused ports
B . configure static ARP entries
C . enable the PortFast feature on ports
D . implement port-based authentication
E . configure ports to a fixed speed
Answer: AD