0 / 60 seg.

Which type of attack targets vulnerabilities associated with translating MAC addresses into IP addresses in computer networking?