Answer Posted / atul
in this technique , an attacker sends packet with an incorrect source address . when this happens , the receiver would inadvertently send replies back to the forged address.
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
Explain the characteristics of bluetooth?
Why is Bluetooth 2.0 better?
What is bluejacking?
What is bluetooth - a technology, a standard, an initiative, or a product?
Differences between bluetooth vs infrared?
Explain about airport in bluetooth?
Explain about Bluetooth.
What is Frequency-Hopping Spread Spectrum (FHSS)?
Explain how data is transferred through bluetooth
Explain about bluetooth profiles?
What types of companies are likely to adopt or promote Bluetooth technology?
why is bluetooth 2.0 better than previous versions?
Is bluetooth is called a cable replacement technology?
Will Bluetooth and Wireless LAN (WLAN) interfere with each other?
What are Different Classes in Bluetooth?