Ask Question
17 November, 07:23

A junior administraotor comes to you in a panic. After looking at the log files, he has become conviced that an attacker is attempting to use a duplicate IP address to replace another system in the network to gain access. Which type of attack is this?

+2
Answers (1)
  1. 17 November, 07:25
    0
    TCP/IP hijacking

    Explanation:

    TCP/IP hijacking occurs when an authorized person receives access to the network connection of another person. This is considered a form of a man-in-the-middle attack.

    The attacker can identify the IP addresses of two session users, a Denial-of-service (DoS) attack is used to incapacitate one of them while a connection is made by mirroring the network ID of the incapacitated user.

    When an IP address is duplicated to replace another system in the network to gain access, TCP/IP hijacking has taken place.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question 👍 “A junior administraotor comes to you in a panic. After looking at the log files, he has become conviced that an attacker is attempting to ...” in 📗 Computers & Technology if the answers seem to be not correct or there’s no answer. Try a smart search to find answers to similar questions.
Search for Other Answers