What are two characteristics of IPv6 Source Guard? (Choose two.)
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. requires the user to configure a static binding 
                            
                            
                        
                        
                        
                            
                                B. used in service provider deployments to protect DDoS attacks 
                            
                            
                        
                        
                        
                            
                                C. requires that validate prefix be enabled 
                            
                            
                        
                        
                        
                            
                                D. requires IPv6 snooping on Layer 2 access or trunk ports 
                            
                            
                        
                        
                        
                            
                                E. recovers missing binding table entries