Answer Posted / ritesh
In IP spoofing, an attacker gains unauthorized access to a
computer or a network by making it appear that a malicious
message has come from a trusted machine by “spoofing
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
give the new arrival of bluetooth in wifi
Name few applications of Bluetooth?
What is DOS attack ?
When are packets passed from TCP layer to application layer?
Explain the different classes in bluetooth?
What is Service Discovery Protocol?
Define bluetooth dongle?
How secure is a Bluetooth network?
What is the signal strength transmitted by cell phones?
Do you Know about OBEX Protocol?
Is it possible to connect multiple Bluetooth hubs?
Explain what types of companies are likely to adopt or promote bluetooth technology?
What are the problems with older versions (1.0 and 1.0 B)?
What is broadcast?
Explain DNS, IP address allocation?