A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee’s computer.
This type of attack is an example of:
A . ARP cache poisoning
B . IP spoofing
C . amplified DNS attack
D . evil twin