Mal is engaging in an IP spoofing attack against a target organization over the internet. What is one of the limitations of this attack if Mal has complete control of her own network?
1) The attack can only target a specific IP address
2) The attack can be easily detected by the target organization
3) The attack can bypass network security measures
4) The attack can cause the target organization's network to crash