which of thje following layer 2 attacks uses teh mac of another known host on the network in order toi bypoass port security measures? a. arp poisonong b. vlan hopping c. mac flooding d. dhcp snooping e. mac spoofing. dhcp snoopin rate-liting is configured on sw's go0/1 interface. what happens if dhcp msgs are received on g0*/1 at a rate faster than the configured limit? a. the msgs that cross the limit will b dropped b. the interface will b disabled c. all dhcp msgs on the interface will b dropped d. a warning syslog msg will b dyusplayed. when dhcp snoopin inspects a dhcp discover msg that arrives onan untrusted interface, what does it check? sel 2 a. source mac b. CHADDR c. IP d. interface. which of the following are function of dhcp snooping? sel 2 a. limiting the rate of dhcp msgs b. filtering dhcp msgs on trusted ports c. filtering dhcp msgs on untrusted ports d. filtering all dhcp msgs. which of the follwing is not stored in the dhcp snooping binding db? a. IP b. interface c. vlan d. default gateway e. mac . which of yje following dhcp msg types will always b discarded if received on a dhcp snooping untrusted interface? sel 3 a. DISCOVER B. REQUEST C. NAK D. OFFER E. DECLINE F. RELEASE G ACK.