SecurityThroughObscurity wrote: » C is correct, partially. To perform ARP spoofing you need to flood a target with fake arp-responses. Subnetting won't help, you can still spoof a victim inside this subnet.