In which of the following attacking methods does an attacker distribute incorrect IP address?
IP spoofing
Mac flooding
DNS poisoning
Man-in-the-middle
Submit