Match the following and select the correct option:
(i) |
Encryption |
(P) |
Manipulation of identification of a host (through NIC identifier) |
(ii) |
MAC cloning |
(Q) |
Determining version and name of OS and OS utilities |
(iii) |
ARP spoofing |
(R) |
Protecting the confidentiality |
(i) |
Finger printing |
(S) |
Poisioning the IP to MAC address mapping |
- (i) – (R), (iI) – (P), (i) – (S), (i) – (Q)
- (i) – (P), (iI) – (R), (i) – (S), (i) – (Q)
- (i) – (R), (iI) – (S), (i) – (P), (i) – (Q)
- (i) – (R), (iI) – (Q), (i) – (S), (i) – (P)