What security advantage occurs from a packet's containing the source NIC address and not just the destination NIC address?

What will be an ideal response?


Allows
answering
back
(acknowledgment).
More
important,
limits
(but
does
not
eliminate)
the
possibility
of
spoofing
or
forging
packets.

Computer Science & Information Technology

You might also like to view...

Adobe Flash is free and always used for animated graphics

Indicate whether the statement is true or false

Computer Science & Information Technology

When using high bandwidth applications over multiple WAN connections, which of the following should be used?

A. Static IP addressing B. Half-duplex C. PoE devices D. Load balancing

Computer Science & Information Technology

External style sheets have a(n) ____ extension.

A. .ess B. .ss C. .cs D. .css

Computer Science & Information Technology

One of the oldest network topologies is the

A) Bus B) Mesh C) Ring D) Star

Computer Science & Information Technology