A threat actor manages to spoof the MAC address in the cache…
A threat actor manages to spoof the MAC address in the cache of a computer with the goal of redirecting traffic. What type of attack is the threat actor launching? a. MAC flooding b. ARP poisoning c. MAC cloning d. MAC cache attack e. CAM spoofing