Which attack being used is when a threat actor creates packets with false source IP address information to either hide the identity of the sender, or to pose as another legitimate user?
- Address Spoofing Attack
- Amplification and Reflection Attacks
- ICMP Attack
- MiTM Attack
- Session Hijacking
Explanation: An example of an address spoofing attack is when a threat actor creates packets with false source IP address information to either hide the identity of the sender, or to pose as another legitimate user. The threat actor can then gain access to otherwise inaccessible data or circumvent security configurations.
Exam with this question: 3.6.7 Check Your Understanding - IP Vulnerabilities and Threats
Exam with this question: 16.2.6 Check Your Understanding - IP Vulnerabilities and Threats
Please login or Register to submit your answer