An organization uses IP address block 203.0.113.0/24 on its internal network. At the border router, the network administrator sets up rules to deny packets with a source address in this subnet from entering the network, and to deny packets with a destination address in this subnet from leaving the network. Which of the following is the administrator attempting to prevent?
A . BGP route hijacking attacks
B . Bogon IP network traffic
C . IP spoofing attacks
D . Man-in-the-middle attacks
E . Amplified DDoS attacks
Answer: C