menu
QAmmunity.org
Login
Register
My account
Edit my Profile
Private messages
My favorites
Ask a Question
Questions
Unanswered
Tags
Categories
Ask a Question
Which type of network attack uses a fake IP address to send data packets from an unauthorized user to a network? A. sniffing B. hijacking C. spoofing D. DoS
asked
Aug 10, 2019
115k
views
5
votes
Which type of network attack uses a fake IP address to send data packets from an unauthorized user to a network?
A. sniffing
B. hijacking
C. spoofing
D. DoS
Computers and Technology
high-school
Behrouz Beheshti
asked
by
Behrouz Beheshti
8.0k
points
answer
comment
share this
share
0 Comments
Please
log in
or
register
to add a comment.
Please
log in
or
register
to answer this question.
2
Answers
7
votes
if im not mistaken its DoS because it gives a fake up address and it can't be traced which is why your able to hack software's without the person knowing
Tony Peterson
answered
Aug 13, 2019
by
Tony Peterson
8.0k
points
ask related question
comment
share this
0 Comments
Please
log in
or
register
to add a comment.
4
votes
D. DoS. DoS is a way to potentially lag or even crash different types of servers ranging from as small as a simple website to bigger websites and video games servers.
Reuben Cummings
answered
Aug 15, 2019
by
Reuben Cummings
8.9k
points
ask related question
comment
share this
0 Comments
Please
log in
or
register
to add a comment.
← Prev Question
Next Question →
Related questions
asked
Oct 27, 2020
94.0k
views
Which of these attack methods helps in legitimate surveillance activities A eavesdropping B spoofing C hijacking D sniffing
Yazzmi
asked
Oct 27, 2020
by
Yazzmi
7.8k
points
Computers and Technology
middle-school
2
answers
1
vote
94.0k
views
asked
Jul 3, 2024
217k
views
Which of the following fraud risks involves viewing information as it passes along network channels? A. Sniffing B. Spoofing C. False Web sites D. Web hijacking
Dan Wagner
asked
Jul 3, 2024
by
Dan Wagner
8.6k
points
Computers and Technology
high-school
1
answer
2
votes
217k
views
asked
Jun 6, 2024
212k
views
Which of the following is not a threat related to ""Unauthorized data disclosure"" under computer crime? A. Surfing B. Pretexting C. Phishing D. Sniffing E. Spoofing
Angshuman
asked
Jun 6, 2024
by
Angshuman
7.4k
points
Computers and Technology
high-school
1
answer
5
votes
212k
views
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.5m
questions
12.2m
answers
Other Questions
“What does it mean when we “rework” copyrighted material?”
Seven basic internal components found in a computer tower
Please help me ! All you do is just put it it all in your own words ! Please this is for my reported card!i don't know how to put it in my own words because my English is not that good!
describe an advance in technology that makes life more enjoyable. what discoveries contribute to this technology?
Disadvantages of using animation in advertising? advantages and disadvantages of using animation for education? advantages and disadvantages of using animation in entertainment?
Twitter
WhatsApp
Facebook
Reddit
LinkedIn
Email
Link Copied!
Copy
Search QAmmunity.org