Which of the following statements is true about IP spoofing?
A.
It is the process used by hackers for disguising the source IP address.
B.
It is the process used by hackers to access the target system.
C.
It is the process used by hackers to find the IP address of a target system.
D.
It is a process used by hackers to generate new IP addresses.
Explanation: