Which two general IP spoofing techniques does a hacker use?

Which two general IP spoofing techniques does a hacker use? Choose two.

Which two general IP spoofing techniques does a hacker use? Choose two.

A.
an IP address within the range of trusted IP addresses

B.
an unknown IP address which cannot be traced

C.
an authorized external IP address that is trusted

D.
an RFC 1918 address



Leave a Reply 0

Your email address will not be published. Required fields are marked *