Which two statements about DHCP snooping are true? (Choose two.)
A.
It is implemented on a per-VLAN basis.
B.
It filters invalid DHCP messages.
C.
The binding database logs trusted and untrusted hosts with leased IP addresses.
D.
Interfaces are trusted by default.
E.
It uses the LFIB to validate requests from untrusted hosts.
A & B are correct.