Refer to the exhibit.
Which three fields of the IP header labeled can be used in a spoofing attack? (Choose one.)
Click on the arrows to vote for the correct answer
A.