ECCouncil Exam Questions

Which of the following is a protocol that is prone to a man-in-the-middle (MITM) attack and maps a 3

Which of the following is a protocol that is prone to a man-in-the-middle (MITM) attack and maps a
32-bit address to a 48-bit address?

A.
ICPM

B.
ARP

C.
RARP

D.
ICMP