In an IP (Internet Protocol) spoofing attack, what field of an IP (Internet Protocol) packet does the
attacker manipulate?
The version field
The source address field
The source port field
The destination address field
Submit