A technician has enabled port security on a switchport.
Which of the following BEST describes the effect this will have?
- Devices must match a list of allowed MAC addresses before accessing the network.
- Devices need to conform to the policies set forth by the MDM software.
- Data loss prevention software will be monitoring for data exfiltration on the port.
- A firewall is actively monitoring the network traffic using heuristic analysis.