A network administrator suspects that an attacker is attempting to redirect traffic from a target workstation to the attacker's machine. Which of the following best describes an attack that can achieve this by exploiting the resolution of IP addresses to MAC addresses?
|Attacks, Threats, and Vulnerabilities
|Architecture and Design
|Operations and Incident Response
|Governance, Risk, and Compliance