edited by
218 views
0 votes
0 votes

Match the following and select the correct option:

(i) Encryption (P) Manipulation of identification of a host (through NIC identifier)
(ii) MAC cloning (Q) Determining version  and name of OS and OS utilities
(iii) ARP spoofing (R) Protecting the confidentiality
(i) Finger printing (S) Poisioning the IP to MAC address mapping
  1. (i) – (R), (iI) – (P), (i) – (S), (i) – (Q)
  2. (i) – (P), (iI) – (R), (i) – (S), (i) – (Q)
  3. (i) – (R), (iI) – (S), (i) – (P), (i) – (Q)
  4. (i) – (R), (iI) – (Q), (i) – (S), (i) – (P)
edited by

Please log in or register to answer this question.

Related questions

0 votes
0 votes
1 answer
2
Ramayya asked Jan 7
233 views
Which of the following is the cause of Ping of death issue related to ICMP packets?Buffer overflowDivide by ZEROMissing input sanitizationPrivilege escalation
3 votes
3 votes
1 answer
3
Ramayya asked Jan 7
301 views
Which of the following methods is used to detect double errors?Odd parityEven parityChecksum (CRC)Checksum (XOR)