Which two of these are potential results of an attacker performing a DHCP server spoofing attack? (Choose two.)