Through which of the following techniques can an attacker obtain a computer's IP address, alter the packet headers, and send request packets to a target machine while pretending to be a legitimate host?
A. IP address decoy
B. Source port manipulation
C. Packet fragmentation
D. IP address spoofing
Answer: D. IP address spoofing
You might also like to view...
The strict, legally-mandated segregation of blacks and whites in the post-Civil War United States came to be known as
a. George Wallace b. Apartheid c. Jim Crow d. Gerrymandering
A(n) ________ household is one that grew and shrunk as needs arose
a. accordion b. extended c. nuclear d. kinship
John Rawls' theory of justice proposed to create societal rules that carry no racial, gendered, class, or nativity bias. His concept is known as the ______.
A. veil of acceptance B. veil of tolerance C. veil of opulence D. veil of ignorance
Martin Luther King Jr. was an example of which type of authority?
A. traditional B. rational-legal C. charismatic D. bureaucratic