In ____, the source IP address in a packet is faked to make recipients suppose that packets are coming from trustworthy IP addresses.

A. tampering
B. snooping
C. sniffing
D. spoofing


Answer: D

Computer Science & Information Technology

You might also like to view...

A(n) ____________________ displays Web pages and helps you navigate from one page to another.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Windows XP does not explicitly detect deadlock situations for threads using dispatcher objects. How might threads using dispatcher objects create a deadlock?What mechanisms does Windows XP include to help avoid these situations?

What will be an ideal response?

Computer Science & Information Technology

Bitmap graphics are ____ dependent, which means image quality deteriorates as size increases. 

A. resolution B. megapixel C. compression D. lossless

Computer Science & Information Technology

The definition REAL val; is ____.

A. not valid in C B. will generate a compiler warning C. is equivalent to double val; if it comes after typedef double REAL; D. defines a macro instance if it comes after #define REAL double

Computer Science & Information Technology