Which two methods can be used to provide secure management access to a Cisco switch? (Choose two.)
a. Configure all switch ports to a new VLAN that is not VLAN 1.
b. Configure specific ports for management traffic on a specific VLAN.
c. Configure SSH for remote management.
d. Configure all unused ports to a "black hole."
e. Configure the native VLAN to match the default VLAN.