PrepAway - Latest Free Exam Questions & Answers

Which of the following types of attack is used to configure a computer to behave as another computer on a trus

Which of the following types of attack is used to configure a computer to behave as another computer on a trusted network by using the IP address or the physical address?

PrepAway - Latest Free Exam Questions & Answers

A.
Distributed denial of service (DDOS) attack

B.
Honeypot

C.
RIP/SAP Spoofing

D.
Identity spoofing


Leave a Reply