The ____________________ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.

A. WWW
B. TCP
C. FTP
D. HTTP

Answer: B

Computer Science & Information Technology

You might also like to view...

When a chart is selected in a PowerPoint slide, the Chart Tools contextual tab appears and contains the Design and Edit tabs

Indicate whether the statement is true or false

Computer Science & Information Technology

In the Windows environment, a ____ is a group of DLLs, information files, and programs that processes print jobs for printing.

A. driver B. renderer C. queue manager D. spooler

Computer Science & Information Technology