Answer Posted / atul
in this technique , an attacker sends packet with an incorrect source address . when this happens , the receiver would inadvertently send replies back to the forged address.
Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
Why is Bluetooth 2.0 better?
Explain what types of companies are likely to adopt or promote bluetooth technology?
What is DOS attack ?
What kind of encryption will be used for Bluetooth security?
List the applications of bluetooth?
Explain few applications of bluetooth?
List some Technology characteristic of Bluetooth?
Explain the data throughput speed of a bluetooth connection?
What types of routing are possible in a wireless network?
Explain the range of bluetooth transmitter/receivers?
Is bluetooth is called a cable replacement technology?
Which method is primarily used for Voice transfer?
How to do bluetooth setting?
Which Bluetooth version uses adaptive frequency hopping?
Explain the characteristics of bluetooth?