An engineer configures a storage environment for a customer with high-security standards. The secure environment is configured in VSAN 50. The customer wants to maintain a configuration and active databases and prevent unauthorized switches from joining the fabric. Additionally, the switches must prevent rogue devices from connecting to their ports by automatically learning the WWPNs of the ports connected to them for the first time. Which two configuration sets must be used to meet these requirements?
A. abric-binding activate vsan 50 force
B. csp dhchap hash md5 sha1
C. lear fabric-binding activate vsan 50 fabric-binding activate vsan 50
D. ort-security enable
E. ort-security activate vsan 50
F. csp enable fcsp auto-activ