Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?

A. rebuking
B. spoofing
C. transmitting
D. victimizing

Answer: B

Computer Science & Information Technology

You might also like to view...

All Office programs have a ribbon that consists Tabs, Groups and ________

A) Commands B) Menus C) Actions D) Tools

Computer Science & Information Technology

A (n) ______ card is used to facilitate the input and output of analog audio, with some cards also enabling the playback of digital audio sources

a. MIDI b. Video capture c. Sound d. Microphone

Computer Science & Information Technology