Posted by: Pdfprep
Post Date: November 23, 2020
Networks are vulnerable to an attack which occurs due to overextension of bandwidth, bottlenecks, network data interception, etc.
Which of the following network attacks refers to a process in which an attacker changes his or her IP address so that he or she appears to be someone else?
A . IP address spoofing
B . Man-in-the-middle attack
C . Denial of Service attack
D . Session sniffing
Answer: A
Leave a Reply