You have an organization that often has visitors connect to the organization’s network. You are worried that someone might modify a DNS record to hijack a computer name. What can you use to prevent this and how do you implement it? How would you construct a lab to demonstrate this? What would be needed, and how would you configure it?