The ____________________ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.
A. WWW
B. TCP
C. FTP
D. HTTP
Answer: B
Computer Science & Information Technology
You might also like to view...
When a chart is selected in a PowerPoint slide, the Chart Tools contextual tab appears and contains the Design and Edit tabs
Indicate whether the statement is true or false
Computer Science & Information Technology
In the Windows environment, a ____ is a group of DLLs, information files, and programs that processes print jobs for printing.
A. driver B. renderer C. queue manager D. spooler
Computer Science & Information Technology