Which of the following types of attack is used to configure a computer to behave as another computer on a trusted network by using the IP address or the physical address?

Which of the following types of attack is used to configure a computer to behave as another computer on a trusted network by using the IP address or the physical address?

Which of the following types of attack is used to configure a computer to behave as another computer on a trusted network by using the IP address or the physical address?

A.
Distributed denial of service (DDOS) attack

B.
Honeypot

C.
RIP/SAP Spoofing

D.
Identity spoofing



Leave a Reply 0

Your email address will not be published. Required fields are marked *