A company has placed a networked PC in a lobby so guests can have access to the corporate directory. A security concern is that someone will disconnect the directory PC and re-connect their laptop computer and have access to the corporate network. For the port servicing the lobby, which three configuration steps should be performed on the switch to prevent this? (Choose three.)
A. Enable port security
B. Create the port as a trunk port
C. Create the port as an access port
D. Create the port as a protected port
E. Set the port security aging time to 0
F. Statically assign the MAC address to the address table
G. Configure the switch to discover new MAC addresses after a set time of inactivity