You work as a Network Administrator for SpyNet Inc.The company has a Windows-based network.
You have been assigned the task of auditing the scheduled network security. After a regular audition, you suspect that the company is under attack by an intruder trying to gain access to the company’s network resources. While analyzing the log files, you find that the IP address of the intruder belongs to a trusted partner company.
Assuming this situation, which of the following attacks is the company being subjected to?
A.
Spoofing
B.
Man-in-the-middle
C.
CookieMonster
D.
Phreaking