Networks are vulnerable to an attack which occurs due to overextension of bandwidth, bottlenecks,
network data interception, etc. Which of the following network attacks refers to a process in which an
attacker changes his or her IP address so that he or she appears to be someone else?
A.
Session sniffing
B.
IP address spoofing
C.
Man-in-the-middle attack
D.
Denial of Service attack
Explanation: