Download Ec-council.Examsheets.312-50.v2014-02-04.by.Batista

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Document related concepts

Computer and network surveillance wikipedia, lookup

Computer security compromised by hardware failure wikipedia, lookup

Transcript
A.
B.
C.
D.
E.
19.25.19.10
51.32.123.21
168.150.84.123
215.52.220.122
8.10.2/8.10.2
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation: Spoofing can be easily achieved by manipulating the "from" name field,however,it is much more
difficult to hide the true source address. The "received from" IP address 168.150.84.123 is the true source of
the