Implementing Cisco Network Security (IINS v3.0) (#34)

Which three statements describe DHCP spoofing attacks? (Choose three.)

They can modify traffic in transit.
They are used to perform man-in-the-middle attacks.
They use ARP poisoning.
They can access most network devices.
They protect the identity of the attacker by masking the DHCP address.
They can physically modify the network gateway.