Tag: Which of the following describes ip spoofing?