Which of the following is a process of borrowing identity information, such as an IP address, domain name, NetBIOS name, or TCP or UDP port numbers to hide or deflect interest in attack activities?

A. Ingress filtering
B. Data authentication
C. Network sniffing
D. Spoofing


Answer: D

Computer Science & Information Technology

You might also like to view...

To display the ruler in Word, select the Ruler check box on the VIEW tab

Indicate whether the statement is true or false

Computer Science & Information Technology

WLAN security based on a PSK technology is called ________ mode

A) personal B) private C) home D) WEP

Computer Science & Information Technology

To increase user security, Apple has introduced a ____ which is used to manage a user's list of all user names and passwords.

A. secure key ring B. secure key chain C. secure password chain D. secure password purse

Computer Science & Information Technology

?

What will be an ideal response?

Computer Science & Information Technology