A man in the middle attack refers to an intermediate that sees the data exchange between server and client. To the server, all messages appear to be sent to or received from the client; and to the client all the packets appear to have been sent to or received from the server. If a hacker is using the man-in-the-middle attack, the hacker will send at least two data packets as shown to achieve this attack.

Which of the following packet 1 and packet 2 Field Description is correct? (Choose two answers)
- Packet 1:
Source IP 1.1.1.1 Source MAC C-C-C
The purpose of IP 1.1.1.2 The purpose of Mac B-B-B - Packet 1: Source IP 1.1.1.3
Source MAC C-C-C
The purpose of IP 1.1.1.2 The purpose of Mac B-B-B - Packet 2:
Source IP 1.1.1.2 Source MAC C-C-C
The purpose of IP 1.1.1.1 The purpose of Mac A-A-A - Packet 2:
Source IP 1.1.1.3 Source MAC C-C-C
The purpose of IP 1.1.1.1 The purpose of Mac A-A-A
Reveal Solution Next Question