Answer Posted / atul
in this technique , an attacker sends packet with an incorrect source address . when this happens , the receiver would inadvertently send replies back to the forged address.
Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
How to pairing in bluetooth?
List the applications of bluetooth?
Define bluetooth profiles?
Which Bluetooth version uses adaptive frequency hopping?
Explain about ip spoofing?
Explain what companies are involved in the bluetooth initiative?
Define cabir worm?
Explain tcp flow control?
Explain DNS, IP address allocation?
Explain the range of bluetooth transmitter/receivers?
Is the slave to slave communication is possible in piconet and if yes then how?
What are the uses of bluetooth?
What types of routing are possible in a wireless network?
Explain the the problems with older versions (1.0 and 1.0 b)?
Can you please explain the difference between bluetooth and infra red?