david would like to add extra security to his network device. he is afraid that someone might try and connect an unauthorized device to the network via an open network drop. which security option should david employ?