Spoofing should be prevented because it may be used to:
A. assemble information, track traffic, and identify network vulnerabilities.
B. predict which way a program will branch when an option is presented.
C. gain illegal entry to a secure system by faking the sender’s address.
D. capture information such as password traveling through the network.
A. assemble information, track traffic, and identify network vulnerabilities.
B. predict which way a program will branch when an option is presented.
C. gain illegal entry to a secure system by faking the sender’s address.
D. capture information such as password traveling through the network.