skterfrank93471 skterfrank93471 08-02-2024 Computers and Technology contestada Which of the following would be BEST to use to detect a MAC spoofing attack? A. Internet Control Message Protocol B. Reverse Address Resolution Protocol C. Dynamic Host Configuration Protocol D. Internet Message Access Protocol