The ____ attack enables one host to claim that it has the IP address of another. It is most effective where trusted relationships exist between machines networked using TCP/IP.
A. denial of service
B. TCP SYN flood
C. IP spoofing
D. IP session hijacking
Answer: C
You might also like to view...
What type of analysis method is difficult to apply due to the nature of ICT projects, and must be utilized with other risk analysis methods for full effect?
A. Quantitative analysis B. Qualitative analysis C. Cumulative analysis D. Baseline analysis
In an MS-DOS COPY command, if no file name is specified for the destination file, the __________ is used.
a. default file name b. You must specify both source and a destination file names. c. The command is rejected by MS-DOS. d. source file name
Which of the following is NOT a typical component of a dialog box?
A) Spin arrows B) Text boxes C) Title bar D) Check boxes
When the ____________________ logical operator is used with two simple expressions, the condition is true only if both individual expressions are true by themselves.
Fill in the blank(s) with the appropriate word(s).