Refer to the exhibit.
In the figure, the load balancer acts a transparent TCP proxy, and establishes the connection with the client on behalf of the real server.
What is this type of spoofing called?
A.