The CISO has tasked you to design and implement an IT port security strategy. While researching the options, you realize there are several potential concepts that are labeled as port security. You prepare a report to present options to the CISO. Which of the following are port security concepts you should include on this report?
a. Shipping container storage
b. Transport layer
c. NAC
d. RJ-45 jacks