Which two statements describe DHCP spoofing attacks?
Which two statements describe DHCP spoofing attacks? (Choose two)
A. They can access most network devices.
B. They can physically modify the network gateway
C. They protect the identity of the attacker by masking the DHCP address
D. They can modify the flow of traffic in transit
E. They are used to perform man-in-middle attacks
Correct Answer: DE