|Exam 210-260||Question id=627||Content and Endpoint Security|
Which statements describe DHCP spoofing attacks?
They can modify traffic in transit.|
They are used to perform man-in-the-middle attacks.|
They use ARP poisoning.|
They can access most network devices.|
They protect the identity of the attacker by masking the DHCP address.|
They are can physically modify the network gateway.|