πŸ“Š Computer
Q. A spoofing attack is
  • (A) a prepared application that takes advantage of a known weakness.
  • (B) a tool used to quickly check computers on a network for known weaknesses.
  • (C) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
  • (D) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
βœ… Correct Answer: (D) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

You must be Logged in to update hint/solution

πŸ’¬ Discussion


πŸ“Š Question Analytics

πŸ‘οΈ
664
Total Visits
πŸ“½οΈ
4 y ago
Published
πŸŽ–οΈ
Ankit Singh
Publisher
πŸ“ˆ
88%
Success Rate