A lack of validation of the ARP replies can allow an attacker to successfully execute what type of attack?
A. man in the middle
B. rogue DHCP server
C. DNS spoofing
D. replay
A lack of validation of the ARP replies can allow an attacker to successfully execute what type of attack?
A. man in the middle
B. rogue DHCP server
C. DNS spoofing
D. replay