Against IP Spoofing, which of the following description is wrong?
A . IP spoofing is to use the hosts’ normal trust relationship based on the IP address to launch it
B . After IP spoofing attack is successful, the attacker can use forged any IP address to imitate legitimate host to access to critical information
C . An attacker would need to disguise the source IP addresses as trusted hosts, and send the data segment with the SYN flag request for connection
D . The hosts based on IP address’s trust relationship can login directly without entering password verification
Answer: B