Get premium membership and access questions with answers, video lessons as well as revision papers.
A method of masquerading in which an attacker forges the IP addresses on the data packets he sends so they look as if they came from inside a network on which systems trust each other. Because the attacker's system looks like an inside system, he is never asked for a password or any other type of authentication.
Kavungya answered the question on May 17, 2019 at 09:24
- Describe Password Sniffing.(Solved)
Describe Password Sniffing.
Date posted: May 17, 2019. Answers (1)
- Define Rootkits.(Solved)
Define Rootkits.
Date posted: May 17, 2019. Answers (1)
- Define Keyloggers.(Solved)
Define Keyloggers.
Date posted: May 17, 2019. Answers (1)
- Excess Privileges.(Solved)
Excess Privileges.
Date posted: May 17, 2019. Answers (1)
- Define a Zero Day Attack.(Solved)
Define a Zero Day Attack.
Date posted: May 17, 2019. Answers (1)
- Describe social engineering.(Solved)
Describe social engineering.
Date posted: May 17, 2019. Answers (1)
- What is Pharming?(Solved)
What is Pharming?
Date posted: May 17, 2019. Answers (1)
- What is Phishing?(Solved)
What is Phishing?
Date posted: May 17, 2019. Answers (1)
- Define electronic spamming.(Solved)
Define electronic spamming.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting scanning attacks.(Solved)
Describe the ways of detecting scanning attacks.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Excess Privileges.(Solved)
Describe the ways of detecting Excess Privileges.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Data Diddling.(Solved)
Describe the ways of detecting Data Diddling.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Trojan Horses, Viruses, Worms, Salamis, and Logic Bombs.(Solved)
Describe the ways of detecting Trojan Horses, Viruses, Worms, Salamis, and Logic Bombs.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Timing Attacks.(Solved)
Describe the ways of detecting Timing Attacks.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Trap Doors.(Solved)
Describe the ways of detecting Trap Doors.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Software Piracy.(Solved)
Describe the ways of detecting Software Piracy.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Masquerading.(Solved)
Describe the ways of detecting Masquerading.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Wiretapping and Eavesdropping.(Solved)
Describe the ways of detecting Wiretapping and Eavesdropping.
Date posted: May 17, 2019. Answers (1)
- Describe Dumpster Diving.(Solved)
Describe Dumpster Diving.
Date posted: May 17, 2019. Answers (1)
- Explain the measures to fight unethical use of ICT.(Solved)
Explain the measures to fight unethical use of ICT.
Date posted: May 17, 2019. Answers (1)