A company wants to build a cloud environment where individual departments can host applications and data on shared resources, but users cannot access data
that is outside of their department without specific permissions. To deploy an architecture that meets this requirement, the network administrator will need to employ
which of the following configurations on the switches?
A. Port security
B. Packet shaping
C. Routing tables