This is a dedicated watch page for a single video.
Through which of the following techniques can an attacker obtain a computer’s IP address, alter the packet headers, and send request packets to a target machine while pretending to be a legitimate host?