Select the statement that best describes what is involved in IP address spoofing ?
Hackers steal passwords from mail clients by disguising themselves as administrators
Hackers send data packets with bogus IP source addresses pretendding to be packets from an internet station
Hackers pretend to work for internet security company and ask employees to reveal their passwords
Hackers attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy web site