What are two methods of mitigating MAC address flooding attacks? (Choose two.)
A.
Place unused ports in a common VLAN.
B.
Implement private VLANs.
C.
Implement DHCP snooping.
D.
Implement port security.
E.
Implement VLAN access maps.
Explanation: