Which three fields of the IP header labeled can be used in a spoofing attack?

Refer to the exhibit.

Which three fields of the IP header labeled can be used in a spoofing attack? (Choose
one.)

Refer to the exhibit.

Which three fields of the IP header labeled can be used in a spoofing attack? (Choose
one.)

A.
6, 7, 11

B.
6, 11, 12

C.
3, 11, 12

D.
4, 7, 11



Leave a Reply 0

Your email address will not be published. Required fields are marked *