Answer Posted / atul
in this technique , an attacker sends packet with an incorrect source address . when this happens , the receiver would inadvertently send replies back to the forged address.
Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
What is it - a technology, a standard, an initiative, or a product?
Explain the data throughput speed of a bluetooth connection?
Define cabir worm?
What is tcp connection establishment and tear down?
How does Bluetooth fit in with WiFi?
How many devices can communicate concurrently?
Explain how data is transferred through bluetooth
What is Frequency-Hopping Spread Spectrum (FHSS)?
Define bluetooth dongle?
Explain what companies are involved in the bluetooth initiative?
What is the data throughput speed of a Bluetooth connection?
Can you please explain the difference between power classes in bluetooth?
What is the range of Bluetooth transmitter/receivers?
What is ICMP, ARP, Multicast, Broadcast?
What is bluebugging?