Networks are vulnerable to an attack which occurs due to overextension of bandwidth,
bottlenecks, network data interception, etc.
Which of the following network attacks refers to a process in which an attacker changes his or her
IP address so that he or she appears to be someone else?
A.
IP address spoofing
B.
Man-in-the-middle attack
C.
Denial of Service attack
D.
Session sniffing