I was wondering, will the victim/gateway computer accept your spoof if it it doesn't send out a request and already has a cache of the gateway/victim?