Which of the following types of attack is used to configure a computer to behave as another computer
on a trusted network by using the IP address or the physical address?
A.
Distributed denial of service (DDOS) attack
B.
Honeypot
C.
RIP/SAP Spoofing
D.
Identity spoofing