A.Administratively shut down the interfaces.
B.Physically secure the interfaces.
C.Configure a virtual terminal password and login process.
D.Enter an access list and apply it to the terminal interfaces using the access-class command.
E.Create an access list and apply it to the terminal interfaces using the access-group command.