What type of spoofing attack uses fake source IP addresses that are different than their real IP addresses?
A. MAC spoofing
B. IP spoofing
C. application spoofing
D. name spoofing
What type of spoofing attack uses fake source IP addresses that are different than their real IP addresses?
A. MAC spoofing
B. IP spoofing
C. application spoofing
D. name spoofing