What are two methods of mitigating MAC address flooding attacks? (Choose two.) Select 2 response(s).
A.
Place unused ports in a common VLAN.
B.
Implement private VLANs.
C.
Implement DHCP snooping.
D.
Implement port security.
E.
Implement VLAN access maps.