Which of the following network attacks refers to a process in which an attacker changes his or her IP address so that he or she appears to be someone else?

Posted by: Pdfprep Category: 312-49v9 Tags: , ,

Networks are vulnerable to an attack which occurs due to overextension of bandwidth, bottlenecks, network data interception, etc.

Which of the following network attacks refers to a process in which an attacker changes his or her IP address so that he or she appears to be someone else?
A . IP address spoofing
B . Man-in-the-middle attack
C . Denial of Service attack
D . Session sniffing

Answer: A

Leave a Reply

Your email address will not be published.