Which two general IP spoofing techniques does a hacker use? Choose two.
A.
an IP address within the range of trusted IP addresses
B.
an unknown IP address which cannot be traced
C.
an authorized external IP address that is trusted
D.
an RFC 1918 address