What is the name given to an attack that masks the attackers true source IP address by using an address borrowed from a device on a trusted network?

What is the name given to an attack that masks the attackers true source IP address by using an
address borrowed from a device on a trusted network?

What is the name given to an attack that masks the attackers true source IP address by using an
address borrowed from a device on a trusted network?

A.
Land attack

B.
Denial of service

C.
SYN attack

D.
Spoofing

Explanation:

: This kind of attack is called spoofing, a spoof attack consist of an attacker using an IP address
that its not its real one, the used address is usually an address considered as trusted in the
network being attacked. There are many free programs in the web that lets you use the spoof
functionality.



Leave a Reply 0

Your email address will not be published. Required fields are marked *