What is spoofing?
a. Where a packets claims its source to be other that what its source really is.
b. Same as "denial of service" attacks
c. Where a machine continually pings another machine
d. Where certain broadcasts are passed through a router
Answer / indu
A
NOTE: There is protection built-in in IPv6 to against this.
| Is This Answer Correct ? | 0 Yes | 0 No |
what command to restore if the boot block is corrupted in linux
Which option of the dhtadm command modifies an entry in the dhcptab table ?
What LAN analyzer tools are you familiar with and describe how you use them to troubleshoot and on what media and network types.
2 Answers College School Exams Tests, WeSolv,
Which command tells the state of the Ethernet interfaces ?
How long is the "Destination Address" field in an Ethernet frame? a. 2 bytes b. 4 bytes c. 6 bytes d. 8 bytes
Protocols that support multipath LAN to LAN communication are what type of protocols.
if one server is down, whenever restart the machine we get ok prompt what is the problem?
True or False: Each OSI layer thinks it is communicating directly with the same layer in another computer. Even though the data is going through several layers.
Where does sys_unconfig reside ?
This type of access method is generally used by Ethernet to regulate network traffic on a main cable segment.
You have a class C subnet. You would like divide it up into 8 more subnets by "subnetting" ? What would be the subnet mask ? a. 255.255.255.192 b. 255.255.255.224 c. 255.255.255.240 d. 255.255.255.248 d. 255.255.255.252
FQDN stands for ?