When configured in accordance to Cisco best practices, the ip verify source command can
mitigate which two types of Layer 2 attacks? (Choose two.)
A.
rogue DHCP servers
B.
ARP attacks
C.
DHCP starvation
D.
MAC spoofing
E.
CAM attacks
F.
IP spoofing