In what type of attack does an attacker virtually change a device’s burned-in address in an attempt to circumvent access lists and mask the device’s true identity?
A.
gratuitous ARP
B.
ARP poisoning
C.
IP spoofing
D.
MAC spoofing
In what type of attack does an attacker virtually change a device’s burned-in address in an attempt to circumvent access lists and mask the device’s true identity?
In what type of attack does an attacker virtually change a device’s burned-in address in an attempt to circumvent access lists and mask the device’s true identity?
A.
gratuitous ARP
B.
ARP poisoning
C.
IP spoofing
D.
MAC spoofing