Which two of these are potential results of an attacker performing a DHCP server spoofing attack?
Which two of these are potential results of an attacker performing a DHCP server spoofing attack? (Choose two.)
Which two of these are potential results of an attacker performing a DHCP server spoofing attack? (Choose two.)