Based on the Beliles and Twinam (2008) article what role doesan Ethernet layer 2 switch play in virtual local-area networks(VLAN)? How can an Ethernet layer 2 switch be used to implementphysical and data security policies? How does protecting a VLANswitch in a secure physical location prevent tampering?