Refer to the exhibit.
Which three fields of the IP header labeled can be used in a spoofing attack? (Choose
one.)
A.
6, 7, 11
B.
6, 11, 12
C.
3, 11, 12
D.
4, 7, 11
Refer to the exhibit.
Which three fields of the IP header labeled can be used in a spoofing attack? (Choose
one.)
A.
6, 7, 11
B.
6, 11, 12
C.
3, 11, 12
D.
4, 7, 11