Which of the following is a process of borrowing identity information, such as an IP address, domain name, NetBIOS name, or TCP or UDP port numbers to hide or deflect interest in attack activities?

A. Ingress filtering
B. Data authentication
C. Network sniffing
D. Spoofing

Answer: D

Computer Science & Information Technology

You might also like to view...

All of the following methods are used for securing communications with Web browsers EXCEPT ________

A) Electronic Data Interchange (EDI) B) Secure Socket Layer (SSL) C) Certificate Authority (CA) D) Transport Security Layer (TSL)

Computer Science & Information Technology

Using a reference to access the value of a variable without the need for explicitly using the indirection operator symbol(*) is referred to as a(n) ____.

A. automatic access B. quick lookup C. variable access D. automatic dereference

Computer Science & Information Technology