Watch this video on YouTube
Sarah, a network administrator, noticed that some devices on her network are receiving network packets that appear to come from trusted sources but actually originate from unauthorized entities. What type of attack is Sarah most likely dealing with?