brian notices an attack taking place on his network. when he digs deeper, he realizes that the attacker has a physical presence on the local network and is forging media access control (mac) addresses. which type of attack is most likely taking place?