The ____ attack enables one host to claim that it has the IP address of another. It is most effective where trusted relationships exist between machines networked using TCP/IP.

A. denial of service
B. TCP SYN flood
C. IP spoofing
D. IP session hijacking

Answer: C

Computer Science & Information Technology

You might also like to view...

A UPS is NOT recommended for VoIP systems since it is Internet based

Indicate whether the statement is true or false

Computer Science & Information Technology

If you want to use a font size that is not on the drop-down menu of the Font Size box, type the point size directly in the Font Size box, and then press the____ key.

A. Tab B. Alt+C C. F2 D. Enter

Computer Science & Information Technology