Choose the true statements regarding IP spoofing attack and DoS attack

Choose the true statements regarding IP spoofing attack and DoS attack. (Choose all that apply)

Choose the true statements regarding IP spoofing attack and DoS attack. (Choose all that apply)

A.
IP spoofing attack is a prelude for a DoS attack.

B.
DoS attack is a prelude for a IP spoofing attack.

C.
IP spoofing attack is generally performed by inserting a string of malicious commands into the data that is passed between a client and a server.

D.
A DoS attack is generally performed by inserting a string of malicious command into the data that is passed between a client and a server.

Explanation:
IP spoofing attacks are often a launch point for other attacks. The classic example is to launch a denial-of-service (DoS) attack using spoofed source addresses to hide the hacker’s identity.
Normally, an IP spoofing attack is limited to the injection of malicious data or commands into an existing stream of data that is passed between a client and server application or a peer-to-peer network connection.
REF; Safe white papers;page 65
SAFE: Extending the Security Blueprint to Small, Midsize, and Remote-User Networks



Leave a Reply 0

Your email address will not be published. Required fields are marked *