What is spoofing?
a. Where a packets claims its source to be other that what its source really is.
b. Same as "denial of service" attacks
c. Where a machine continually pings another machine
d. Where certain broadcasts are passed through a router
Answer / indu
A
NOTE: There is protection built-in in IPv6 to against this.
Is This Answer Correct ? | 0 Yes | 0 No |
How do you display a routing table on a Cisco? On a host?
How proxy servers protect computer networks?
howmany layers in the OSI model.
Explain the importance of implementing a fault tolerance system? Are there limitations?
Which of the follwoing are Layer2 protocols ? Choose all that apply. a. HDLC b. IP c. UDP d. SLIP e. PPP
Can we run STP and RSTP in a same box?
Have you configured a NFS server?
Which command will make the inetd reread the inetd.conf file ?
You just added a new alias in the /etc/aliases file. What command should you run to activate the change ?
What are entries in the DHCP network database ?
In the nsswitch.conf file what does the following entry mean ? NOTFOUND=continue
What is network architecture?