A security engineer is using a sniffer to determine the source of apparently hostile traffic on an organization’s internal routed network. When the engineer examines individual frames, he sees that the source MAC address for the hostile packets matches the MAC address for the router on the local network. What is the best explanation for this?
a. The packets are encapsulated in a tunneling protocol such as PPTP.
b. The packets have a spoofed originating MAC address in order to make identification of the hostile node more difficult.
c. Frames carrying IP traffic originating on another network will have a MAC address for the local network’s router.
d. The packets are IPX protocol, not IP.
c. Frames carrying IP traffic originating on another network will have a MAC address for the local network’s router.
You might also like to view...
________ is a data collection technology that uses electronic tags attached to items to allow the items to be identified and tracked by a remote system.
A) EPC B) DES C) RFID D) IoT
Styles applied to a table cell have the highest precedence and override any styles applied to a table row or to the table element itself.
Answer the following statement true (T) or false (F)
Computer circuitry consists of two-state on/off switches, often represented by 1 or 0.
Answer the following statement true (T) or false (F)
In the Windows Store, Games, Social, Entertainment, and Photo are examples of ________
A) collections B) apps C) categories D) Live Tiles