Which of the following is a process of borrowing identity information, such as an IP address, domain name, NetBIOS name, or TCP or UDP port numbers to hide or deflect interest in attack activities?
A. Ingress filtering
B. Data authentication
C. Network sniffing
D. Spoofing
Answer: D
Computer Science & Information Technology
You might also like to view...
To display the ruler in Word, select the Ruler check box on the VIEW tab
Indicate whether the statement is true or false
Computer Science & Information Technology
WLAN security based on a PSK technology is called ________ mode
A) personal B) private C) home D) WEP
Computer Science & Information Technology
To increase user security, Apple has introduced a ____ which is used to manage a user's list of all user names and passwords.
A. secure key ring B. secure key chain C. secure password chain D. secure password purse
Computer Science & Information Technology
?
What will be an ideal response?
Computer Science & Information Technology