An attacker wants to launch an attack on a wired Ethernet. He wants to accomplish the following tasks:
· Sniff data frames on a local area network.
· Modify the network traffic.
· Stop the network traffic frequently.
Which of the following techniques will the attacker use to accomplish the task?
A.
ARP spoofing
B.
IP spoofing
C.
Eavesdropping
D.
Session hijacking
Explanation: