Explanation IP spoofing replaces the untrusted source IP address with a fake, trusted one, to hijack connections to your network. Attackers use IP spoofing to send malware and bots to your protected network, to execute DoS attacks, or to gain unauthorized access. References:
156-215.80 Exam Question 362
Which Threat Prevention Profile is not included by default in R80 Management?