Which of the following types of attack is being used when an attacker responds by sending the MAC address of the attacking machine to resolve the MAC to IP address of a valid server?
A . Session hijacking
B . IP spoofing
C . Evil twin
D . ARP poisoning
Answer: D