What are the main categories of spoofing?

What will be an ideal response?

Hackers employ several different types of spoofing, depending on factors such as the intended target and how much information about the network is available. The main categories of spoofing include the following:* Blind spoofing* Active spoofing* IP spoofing* ARP (Address Resolution Protocol) spoofing* Web spoofing* DNS (Domain Name System) spoofing

Computer Science & Information Technology

You might also like to view...

Data can be edited and resaved on a DVD-ROM

Indicate whether the statement is true or false

Computer Science & Information Technology

When a table contains repeating information in one or more fields, such as a city or state, you can use the Table Analyzer Wizard to move the data into related tables. This process is called normalization

Indicate whether the statement is true or false

Computer Science & Information Technology