What is spoofing and how can it be used to attack a computer or network?
What will be an ideal response?
In spoofing, the address of the source computer is changed to make a packet appear to come
from a different computer. Using spoofing, an attacker can initiate access to a computer or can appear as just another transmission to a computer from a legitimate source that is already connected. A source routing attack can be considered a form of spoofing. Also, a DoS attack that floods a host with packets from many bogus source addresses is a form of spoofing.
You might also like to view...
WPS simplifies the configuration process, enabling the user to set up WPA PSK without having to enter a long string of symbols, random numbers, or letters. This provides a feature to protect wireless networks, but it is still susceptible to what kind of attack?
What will be an ideal response?
In addition to its primary layers, most operating systems incorporate a set of __________ routines such as linkage editors, loaders, line editors, disk formatting routines, sort routines, debugging features, library management routines, and so on.
a. resident b. utility c. add-on d. optional
Offers visitors a choice from a given set of options.
a. Hidden fields b. Select boxes c. Radio buttons d. Password box e. Checkboxes f. Email, telephone, and URL input types
The ____ action button jumps to Slide 1.
A. Home B. End C. Document D. Information