Microsoft Exam Questions

Which of the following types of attack is used to configure a computer to behave as another computer

Which of the following types of attack is used to configure a computer to behave as another computer on a trusted network by using the IP address or the physical address?

A.
Distributed denial of service (DDOS) attack

B.
Honeypot

C.
RIP/SAP Spoofing

D.
Identity spoofing