Which three statements describe DHCP spoofing attacks?
Which three statements describe DHCP spoofing attacks? (Choose three.)
A. They can access most network devices.
B. They can modify traffic in transit.
C. They are used to perform man-in-the-middle attacks.
D. They use ARP poisoning.
E. They protect the identity of the attacker by masking the DHCP address.
F. They can physically modify the network gateway.
Correct Answer: BCD