Sail E0 Webinar
Question
Spoofing attack is
Options:
A .  an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
B .  a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
C .  a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
D .  None of these
Answer: Option C

Submit Your Solution Below and Earn Points !
Next Question

Submit Solution

Your email address will not be published. Required fields are marked *

Latest Videos

Latest Test Papers