You suspect that an attacker in your network has configured a rogue Layer 2 device to intercept traffic from multiple VLANs, which allows the attacker to capture potentially sensitive data. Which two methods will help to mitigate this type of activity? (Choose two.)
A.
Turn off all trunk ports and manually configure each VLAN as required on each port
B.
Disable DTP on ports that require trunking
C.
Secure the native VLAN, VLAN 1 with encryption
D.
Set the native VLAN on the trunk ports to an unused VLAN
E.
Place unused active ports in an unused VLAN