Networks are vulnerable to an attack which occurs due to overextension of bandwidth,
bottlenecks, network data interception, etc. Which of the following network attacks refers to a
process in which an attacker changes his or her IP address so that he or she appears to be
someone else?
A.
Session sniffing
B.
IP address spoofing
C.
Man-in-the-middle attack
D.
Denial of Service attack