Answer :
The type of attack described is called "spoofing." More specifically, it is an example of "IP address spoofing."
In IP address spoofing, an attacker sends network traffic with a false source IP address, making it appear as if the traffic originated from a different device on the network.
In this case, the network resource is masquerading as a legitimate network server, and as a result, the hosts on the network are sending requests to the attacker rather than the real server. This type of attack can be used to intercept, modify, or block network traffic, leading to various security issues.
To mitigate IP address spoofing attacks, network administrators can implement various measures, such as using ingress filtering, network access controls, and cryptographic authentication protocols.
Learn more about IP address spoofing at
brainly.com/question/15179149
#SPJ4