What role does an Ethernet layer 2 switch play in virtual local-area networks (VLAN)?How can an Ethernet layer 2 switch be used to implement physical and data security policies?How does protecting a VLAN switch in a secure physical location prevent tampering?

What role does an Ethernet layer 2 switch play in virtual local-area networks (VLAN)?How can an Ethernet layer 2 switch be used to implement physical and data security policies?How does protecting a VLAN switch in a secure physical location prevent tampering?