lucca wants to prevent workstations on his network from attacking each other. if lucca's corporate network looks like the network shown here, what technology should he select to prevent laptop a from being able to attack workstation b?