In R80 spoofing is defined as a method of:

In R80 spoofing is defined as a method of:

In R80 spoofing is defined as a method of:

A.
Disguising an illegal IP address behind an authorized IP address through Port Address Translation.

B.
Hiding your firewall from unauthorized users.

C.
Detecting people using false or wrong authentication logins

D.
Making packets appear as if they come from an authorized IP address.

Explanation:
IP spoofing replaces the untrusted source IP address with a fake, trusted one, to hijack
connections to your network. Attackers use IP spoofing to send malware and bots to your protected network, to
execute DoS attacks, or to gain unauthorized access.

http://dl3.checkpoint.com/paid/74/74d596decb6071a4ee642fbdaae7238f/
CP_R80_SecurityManagement_AdminGuide.pdf?
HashKey=1479584563_6f823c8ea1514609148aa4fec5425db2&xtn=.pdf



Leave a Reply 0

Your email address will not be published. Required fields are marked *