In what type of attack does an attacker virtually change a device’s burned-in address in an attempt to
circumvent access lists and mask the device’s true identity?
A.
gratuitous ARP
B.
ARP poisoning
C.
IP spoofing
D.
MAC spoofing
Explanation:
BD
A device’s burned-in address is its MAC address. So by changing it to something else may trick hosts on the
network into sending packets to it.