You suspect an attacker in your network has configured a rogue layer 2 device to intercept traffic
from multiple VLANS, thereby allowing the attacker to capture potentially sensitive data. Which
two methods will help to mitigate this type of activity? (Choose two.)
A.
Turn off all trunk ports and manually configure each VLAN as required on each port
B.
Disable DTP on ports that requiretrunking
C.
Secure the native VLAN, VLAN 1 with encryption
D.
Set the native VLAN on the trunk ports to an unused VLAN
E.
Place unused active ports in an unused VLAN