Q.

Spoofing attack is

A. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
B. a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
C. a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
D. None of these
Answer» C. a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
1.9k
1
Do you find this helpful?
13

View all MCQs in

Computer Security

Discussion

OPOLOT NELSON
1 year ago

spoofing attack is when someone pretends to be someone else inorder to steal data or spread malware
0