Answer Posted / atul
in this technique , an attacker sends packet with an incorrect source address . when this happens , the receiver would inadvertently send replies back to the forged address.
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
What are the uses of bluetooth?
Explain TCP connection establishment and tear down?
What is bluebugging?
Can you please explain the difference between bluetooth and infra red?
What is bluesnarfing?
Define bluetooth profiles?
Define ldap?
What is the range of Bluetooth transmitter/receivers?
What is a Bluetooth dongle?
explain how bluetooth devices integrate easily with tcp/ip network
Why can Bluetooth equipment integrate easily in TCP/IP network?
What are the difference between power classes in bluetooth?
Explain the difference between power classes in bluetooth?
How does traceroute work?
What companies are involved in the Bluetooth initiative?