Answer Posted / atul
in this technique , an attacker sends packet with an incorrect source address . when this happens , the receiver would inadvertently send replies back to the forged address.
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
Is Bluetooth practical for use with mobile devices?
What is the signal strength transmitted by cell phones?
Explain the range of bluetooth transmitter/receivers?
What are the other (competing or not) wireless technologies?
Explain about dos attack in bluetooth?
What types of companies are likely to adopt or promote Bluetooth technology?
How to pairing in bluetooth?
Can you please explain the difference between power classes in bluetooth?
give the new arrival of bluetooth in wifi
What are the uses of bluetooth?
Explain how data is transferred through bluetooth
What is bluebugging?
What is the data throughput speed of a Bluetooth connection?
Explain about bluetooth sig?
Will bluetooth and wireless lan interfere with each other?