What are two characteristics of IPv6 Source Guard? (Choose two.)
A. requires the user to configure a static binding
B. used in service provider deployments to protect DDoS attacks
C. requires that validate prefix be enabled
D. requires IPv6 snooping on Layer 2 access or trunk ports
E. recovers missing binding table entries