In each option, a Layer 2 security attack is specified. Which statement correctly matches the correct mitigation technique with the specified Layer 2 switch attack? Select the best response.
A.
Configure DHCP spoofing to mitigate ARP address spoofing attacks.
B.
Configure DHCP spoofing to mitigate DHCP spoofing attacks.
C.
Configure PVLANs to mitigate MAC address flooding attacks.
D.
Configure port security to mitigate MAC address flooding attacks.
E.
Enable root guard to mitigate ARP address spoofing attacks.
F.
Configure dynamic ARP inspection (DAI) to mitigate IP address spoofing on DHCP untrusted ports.