Answer:
A. Utilize the native VLAN only on trunk ports to reduce the risk of a Double-Tagged 802 1q VLAN hopping attack
C. Utilize DHCP snooping on a per VLAN basis an apply IP DHCP snooping entrusted on all ports.
D. Utilize the ARP inspection feature to help prevent the misuse of garpe Utilize private VLANs an ensure that all ports are part of the isolated port group.
Explanation:
We must configure the native VLAN only on trunk ports because in this way we are not to receive fake VLAN, and can steal information.
We can use DHCP snooping to configure trusted ports and entrusted ports, in this case, the trusted port can accept trust messages, only with those messages we can connect with the server.
We could ask the MAC address with ARP inspections, MAC address is unique value for a physical hardware in the world.