Which of these techniques mitigate Spanning-Tree Protocol manipulation? (Select two.)
A.
Implement dynamic port security
B.
Use the root guard feature.
C.
Use DHCP snooping along with dynamic ARP inspection
D.
Use dedicated VLAN IDs for all trunk ports.
E.
Set all user ports tonontrunking mode by explicitly turning off DTP
F.
Implement the BPDU guard command enhancement.