Provide a brief definition of spoofing.
What will be an ideal response?
Spoofing is borrowing identity information, such as an IP address, domain name, NetBIOS name, or TCP or UDP port numbers, to hide or deflect interest in attack activities. Several attacks are based on this spoofing technique. For example, there are some NetBIOS attacks in which an attacker sends spoofed NetBIOS Name Release or NetBIOS Name Conflict messages to a victim machine. This can force a victim to remove its own valid name from its name table and not respond to other valid NetBIOS requests. Now, the victim cannot communicate with other NetBIOS hosts, which may affect its ability to resolve NetBIOS names with WINS, block its ability to transfer files or communicate with other hosts on a local network, or even stymie some aspects of Windows DNS that link NetBIOS names to IP addresses, domains, and other important data.
You might also like to view...
A Windows 7 feature that allows you to capture screen shots of any object on your screen is the ________
A) Print Screen Tool B) Snipping Tool C) Capture Tool D) Screen Shot Tool
An image from a digital camera will have ____ channels in the Channels panel in the accompanying figure.
a. two b. three c. four d. six
The OC-768 Optical Carrier standard for fiber-optic networks has a speed of _______________.
Fill in the blank(s) with the appropriate word(s).
Why should the command del *.* be used very carefully?
What will be an ideal response?