Which of the following attacks allows the bypassing of access control lists on servers or routers,
and helps an attacker to hide? Each correct answer represents a complete solution. Choose two.
A.
DNS cache poisoning
B.
MAC spoofing
C.
IP spoofing attack
D.
DDoS attack