Isabella is a security support manager for a large enterprise. in a recent meeting, she was asked which of the standard networking devices already present on the network could be configured to supplement the specific network security hardware devices that were recently purchased. which of these standard networking devices would isabella recommend?