againstARPDescription of spoofing attack, which of the following is false
A. ARPThe implementation mechanism only considers normal business interactions, and does not perform any verification on abnormal business interactions or malicious behaviors
B. ARPSpoofing attacks can only be done byARPReply to achieve, can not passARPrequest fulfillment
C. When a host sends normalARPWhen the request is made, the attacker will preemptively answer, causing the host to establish an erroneousIPandMACMapping relations
D. ARPStatic binding is the solutionARPA scheme of spoofing attack, mainly used in scenarios with small network scale