Which three fields of the IP header labeled can be used in a spoofing attack? (Choose one.)
A.
6, 7, 11
B.
6, 11, 12
C.
3, 11, 12
D.
4, 7, 11
Explanation:
Which three fields of the IP header labeled can be used in a spoofing attack? (Choose one.)
A.
6, 7, 11
B.
6, 11, 12
C.
3, 11, 12
D.
4, 7, 11
Explanation: