Which two methods can be used to provide secure management access to a Cisco switch? (Choose two.) a. Configure all switch ports to a new VLAN that is not VLAN 1. b. Configure specific ports for management traffic on a specific VLAN. c. Configure SSH for remote management. d. Configure all unused ports to a "black hole." e. Configure the native VLAN to match the default VLAN.