The ____ attack enables one host to claim that it has the IP address of another. It is most effective where trusted relationships exist between machines networked using TCP/IP.
A. denial of service
B. TCP SYN flood
C. IP spoofing
D. IP session hijacking
Answer: C
Computer Science & Information Technology
You might also like to view...
A UPS is NOT recommended for VoIP systems since it is Internet based
Indicate whether the statement is true or false
Computer Science & Information Technology
If you want to use a font size that is not on the drop-down menu of the Font Size box, type the point size directly in the Font Size box, and then press the____ key.
A. Tab B. Alt+C C. F2 D. Enter
Computer Science & Information Technology