Which two Layer 2 security best practices would help prevent VLAN hopping attacks? (Choose two.)
Change the native VLAN number to one that is distinct from all user VLANs and is not VLAN 1.
Change the management VLAN to a distinct VLAN that is not accessible by regular users.
Statically configure all ports that connect to end-user host devices to be in trunk mode.
Disable DTP autonegotiation on end-user ports.
Use SSH for all remote management access.