Networks are vulnerable to an attack, which occurs due to overextension of bandwidth, bottlenecks, network data interception, etc.
Which of the following network attack refers to a process in which an attacker changes his or her IP address so that he or she appears to be someone else?
Comments