Internet Protocol (IP) source address spoofing is used to defeat
A.
address-based authentication.
B.
Address Resolution Protocol (ARP).
C.
Reverse Address Resolution Protocol (RARP).
D.
Transmission Control Protocol (TCP) hijacking.
Internet Protocol (IP) source address spoofing is used to defeat
Internet Protocol (IP) source address spoofing is used to defeat
A.
address-based authentication.
B.
Address Resolution Protocol (ARP).
C.
Reverse Address Resolution Protocol (RARP).
D.
Transmission Control Protocol (TCP) hijacking.