Answers were Sorted based on User's Feedback
Answer / atul
in this technique , an attacker sends packet with an incorrect source address . when this happens , the receiver would inadvertently send replies back to the forged address.
|Is This Answer Correct ?||2 Yes||0 No|
Answer / ritesh
In IP spoofing, an attacker gains unauthorized access to a
computer or a network by making it appear that a malicious
message has come from a trusted machine by “spoofing
|Is This Answer Correct ?||0 Yes||0 No|
What is bluejacking?
What is broadcast?
Which company originally conceived and developed Bluetooth?
What is the frequency range used for Bluetooth in Japan?
Will other RF (Radio Frequency) devices interfere with Bluetooth Devices?
Is Bluetooth an IEEE standard, like IEEE 802.11 and Ethernet?
Define ip spoofing?
How frequency hopping is used for security in bluetooth?
Which method is primarily used for Voice transfer?
What companies are involved in the Bluetooth initiative?
Can you please explain the difference between power classes in bluetooth?
What types of routing are possible in a wireless network?