Answer Posted / chaitanya
Packet Filtering : Packet filters are capable for filtering out and blocking packets with conflicting source address information
Avoid trust relationship : Organization should develop protocol that rely on trust relationship as little as possible
Use ARP spoofing detection software : There are programs that inspects and certifies data before it is transmitted and blocks data that is spoofed
Use cryptographic network protocols : By using secure communications protocols like TLS, SSH, HTTP secure prevents ARP spoofing attack by encrypting data prior to transmission and authenticating data when it is received
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What are the 3 types of hackers?
What is footprinting in ethical hacking? What is the techniques used for footprinting?
Who is the best hacker in the world?
How do hackers hack passwords?
What os do hackers use?
What tools do real hackers use?
What laptops do hackers use?
Who is the most dangerous hacker?
What software do hackers use?
Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?
What laptops hackers use?