What is spoofing?
a. Where a packets claims its source to be other that what its source really is.
b. Same as "denial of service" attacks
c. Where a machine continually pings another machine
d. Where certain broadcasts are passed through a router
Answer / indu
A
NOTE: There is protection built-in in IPv6 to against this.
| Is This Answer Correct ? | 0 Yes | 0 No |
can we dynamically assign IP address to clints from server without using DHCP
SMTP stands for?
Give the importance of the osi physical layer?
You have a class B subnet. You would like to divide it up into 10 more subnets by "subnetting" . How many hosts can you have per subnet?
what is swith,hub and router?
How many Machines can be connected in working state together in a Workgroup?
what is ip
Command to troubleshoot DNS problems Host name resolution problems:
You have a class C subnet. You would like divide it up into subnets by "subnetting". You have to have at least 48 nodes per subnet. How many subnets can you have ?
Explain the maximum length allowed for a utp cable?
Internet layer is the same as which layer in OSI ?
True or False: Each OSI layer thinks it is communicating directly with the same layer in another computer. Even though the data is going through several layers.