NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
confidentiality
|
|
integrity
|
|
availability
|
|
authentication
|
Detailed explanation-1: -IP spoofing enables an attacker to replace a packet header’s source IP address with a fake, or spoofed IP address. The attacker does this by intercepting an IP packet and modifying it, before sending it on to its destination.
Detailed explanation-2: -Confidentiality, or data privacy: The means used to ensure that information is made available only to users who are authorized to access it. This ensures that only authorized users can view sensitive data.
Detailed explanation-3: -Which statement is correct regarding why traditional network security devices cannot be used to block web application attacks? Traditional network security devices ignore the content of HTTP traffic, which the vehicle of web application attacks.