ExamGecko
Home Home / ISC / CISSP
Question list
Search
Search

Question 114 - CISSP discussion

Report
Export

Internet Protocol (IP) source address spoofing is used to defeat

A.
address-based authentication.
Answers
A.
address-based authentication.
B.
Address Resolution Protocol (ARP).
Answers
B.
Address Resolution Protocol (ARP).
C.
Reverse Address Resolution Protocol (RARP).
Answers
C.
Reverse Address Resolution Protocol (RARP).
D.
Transmission Control Protocol (TCP) hijacking.
Answers
D.
Transmission Control Protocol (TCP) hijacking.
Suggested answer: A
asked 18/09/2024
Carlos Roberto
52 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first