What type of spoofing attack uses fake source IP addresses that are different than their real IP addresses?
A . MAC spoofing
B . IP spoofing
C . application spoofing
D . name spoofing
Answer: B
What type of spoofing attack uses fake source IP addresses that are different than their real IP addresses?
A . MAC spoofing
B . IP spoofing
C . application spoofing
D . name spoofing
Answer: B