What is the primary purpose of utilizing this to protect the endpoint from unauthorized device insertions?
1) Data encryption
2) Firewall
3) Antivirus software
4) Port security