Which statement is true about Layer 2 security threats?
A.
MAC spoofing in conjunction with ARP snooping, isthe most effective counter-measure reconnaissance
attacks that use Dynamic ARP Inspection to determine vulnerable attack points
B.
DHCP snooping sends unauthorized replies to DHCP queries
C.
ARP spoofing can be used to redirect traffic to counter Dynamic ARP Inspection
D.
Dynamic ARP Inspection in conjunction with ARP spoofing can be used to counter DHCP snooping attacks
E.
MAC spoofing attacks allow an attacking device toreceive frames intended for a different network host
F.
Port scanners are the most effective defense against Dynamic ARP Inspection