An intruder uses TCP spoofing to send packets to a target computer requesting certain privileges be granted to some user.

An intruder uses TCP spoofing to send packets to a target computer requesting certain privileges be granted to some user.



Answer: False 


Learn More :

Network Security

Learn More Multiple Choice Question :