ethanm136 ethanm136 26-10-2022 Computers and Technology contestada a threat actor wants to interrupt a normal tcp communication between two hosts by sending a spoofed packet to both endpoints. which tcp option bit would the threat actor set in the spoofed packet?