What is spoofing?
a. Where a packets claims its source to be other that what its source really is.
b. Same as "denial of service" attacks
c. Where a machine continually pings another machine
d. Where certain broadcasts are passed through a router
Answer / indu
A
NOTE: There is protection built-in in IPv6 to against this.
Is This Answer Correct ? | 0 Yes | 0 No |
Explain the maximum length allowed for a utp cable?
The last octet of the broadcast address of a Class C network is :
what is networking?
what is difference between spyware and mallware ? why we use this ?
Which command causes name daemon to return to level 0 (debug) ?
What is mac addresses?
How do you backup&restore AD
True/Flase: Relative domain name (RDN) ends with the dot.
True:False: TI RPC is supported in Solaris environment.
I am using solaris box, I need to delete a file from path /usr/tmp/ which r older than 24 hours?
Which protocol is used typically within an AS ?
Which command will delete the route to the network 128.251.0.0 via 128.144.1.254 ?