______________ is a technique where an intruder attempts to gain unauthorized access by altering a packet’s IP address to make it appear as though the packet originated in a part of the network with higher access privileges.
A.
Services
B.
IP Spoofing
C.
SYNDefender
D.
NAT
E.
Anti-spoofing