Follow Our FB Page << >> for Daily Laughter. We Post Funny, Viral, Comedy Videos, Memes, Vines...

What is spoofing?

a. Where a packets claims its source to be other that what its source really is.

b. Same as "denial of service" attacks

c. Where a machine continually pings another machine

d. Where certain broadcasts are passed through a router

Answer Posted / indu


NOTE: There is protection built-in in IPv6 to against this.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer       View All Answers

Please Help Members By Posting Answers For Below Questions

Which application protocol can not be blocked by the Switch?


Explain 802.1Q header?.


how i can Design a client–server network with two servers operating at 100Base- T Fast Ethernet speed and the clients operating at regular 10Base-T Ethernet speed using a 10/100 Mbps NIC. The hub is located in a wiring closet, but the servers and clients are not. Assume that a satisfactory performance is achieved at 40% utilization of the LAN.


I am to introduce a new financial product through nationalised Banks.How I could monitor the dealings,ie.payment made or withdrawn from the accounts of our clients and how the customers could read the details of their accounts through the mobiles.


What is the Multicast address used in STP ?


Do you know what protocols fall under the tcp/ip internet layer?


Define mesh topology?


What is the importance of authentication?


Is there any website? Which can theft or watch any system or computer hardware drives(memory)while they are accessing Internet.If it is avilable what is it? Please answer me.Advance thanks


Define tunnel mode?


how to set tunneling in putty when any portno blocked from firewall to use resources with that portno like ssh 22


What can be considered as good passwords?


why we r going to freezing service group and system, what are the freezing steps & how to freezing service group?


Define proxy servers?


What is the major disadvantage of a star topology?