In which of the following attacking methods does an attacker distribute incorrect IP address?
A. IP spoofing
B. Mac flooding
C. Man-in-the-middle
D. DNS poisoning
In which of the following attacking methods does an attacker distribute incorrect IP address?
A. IP spoofing
B. Mac flooding
C. Man-in-the-middle
D. DNS poisoning