A concern has been expressed that the switched infrastructure in an integrated network is vulnerable to VLAN hopping attacks. Which two configuration statements can be used to mitigate VLAN hopping? (Choose two.)
A.
switch port port-security
B.
switch port port-security tagging
C.
switch port access vlan
D.
switch port double tag snooping
E.
switch port mode access