In ____, the source IP address in a packet is faked to make recipients suppose that packets are coming from trustworthy IP addresses.
A. tampering
B. snooping
C. sniffing
D. spoofing
Answer: D
You might also like to view...
A(n) ____________________ displays Web pages and helps you navigate from one page to another.
Fill in the blank(s) with the appropriate word(s).
Windows XP does not explicitly detect deadlock situations for threads using dispatcher objects. How might threads using dispatcher objects create a deadlock?What mechanisms does Windows XP include to help avoid these situations?
What will be an ideal response?
Bitmap graphics are ____ dependent, which means image quality deteriorates as size increases.
A. resolution B. megapixel C. compression D. lossless
The definition REAL val; is ____.
A. not valid in C B. will generate a compiler warning C. is equivalent to double val; if it comes after typedef double REAL; D. defines a macro instance if it comes after #define REAL double