List of questions
Related questions
Question 114 - CISSP discussion
Internet Protocol (IP) source address spoofing is used to defeat
A.
address-based authentication.
B.
Address Resolution Protocol (ARP).
C.
Reverse Address Resolution Protocol (RARP).
D.
Transmission Control Protocol (TCP) hijacking.
Your answer:
0 comments
Sorted by
Leave a comment first