The ____ attack enables one host to claim that it has the IP address of another. It is most effective where trusted relationships exist between machines networked using TCP/IP.

A. denial of service
B. TCP SYN flood
C. IP spoofing
D. IP session hijacking


Answer: C

Computer Science & Information Technology

You might also like to view...

What type of analysis method is difficult to apply due to the nature of ICT projects, and must be utilized with other risk analysis methods for full effect?

A. Quantitative analysis B. Qualitative analysis C. Cumulative analysis D. Baseline analysis

Computer Science & Information Technology

In an MS-DOS COPY command, if no file name is specified for the destination file, the __________ is used.

a. default file name b. You must specify both source and a destination file names. c. The command is rejected by MS-DOS. d. source file name

Computer Science & Information Technology

Which of the following is NOT a typical component of a dialog box?

A) Spin arrows B) Text boxes C) Title bar D) Check boxes

Computer Science & Information Technology

When the ____________________ logical operator is used with two simple expressions, the condition is true only if both individual expressions are true by themselves.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology