Sending packets with false IP source addresses is called ________.

an IP address scanning attack
IP address spoofing
a port scanning attack
None of these.


IP address spoofing

Computer Science & Information Technology

You might also like to view...

An area that allows for the addition of new forms, reports, or other database objects is the ________

A) application B) subform control C) navigation control bar D) navigation form

Computer Science & Information Technology

In Publisher, what happens when text does not all fit in a text box?

A) The text size is made smaller. B) A new text box is created automatically for the overflow. C) The text is deleted. D) The text is hidden.

Computer Science & Information Technology

Google Docs is a group of software products available online.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A blog is used when an individual wants to collaborate with other users. 

Answer the following statement true (T) or false (F)

Computer Science & Information Technology