Which two statements describe DHCP spoofing attacks?
Which two statements describe DHCP spoofing attacks? (Choose Two.)
A. They can modify the flow of traffic in transit.
B. They can access most network devices.
C. They can physically modify the network gateway.
D. They are used to perform man-in-the-middle attacks.
E. They protect the identity of the attacker by masking the DHCP address.
F. They use ARP poisoning.
Correct Answer: AD