Which techniques does SAFE recommend to mitigate MAC spoofing attacks? (Select two.)
A.
Use port security.
B.
Implement IP Source Guard feature.
C.
Set all user ports to nontrunking mode.
D.
Implement BPDU guard enhancement command.
E.
Implement authentication for DHCP messages.
F.
Use DHCP snooping along with DAI.