Prev Question
Next Question

In R80 spoofing is defined as a method of:

A.
Disguising an illegal IP address behind an authorized IP address through Port Address Translation.

B.
Hiding your firewall from unauthorized users.

C.
Detecting people using false or wrong authentication logins

D.
Making packets appear as if they come from an authorized IP address.

Explanation:
IP spoofing replaces the untrusted source IP address with a fake, trusted one, to hijack
connections to your network. Attackers use IP spoofing to send malware and bots to your protected network, to
execute DoS attacks, or to gain unauthorized access.

http://dl3.checkpoint.com/paid/74/74d596decb6071a4ee642fbdaae7238f/
CP_R80_SecurityManagement_AdminGuide.pdf?
HashKey=1479584563_6f823c8ea1514609148aa4fec5425db2&xtn=.pdf

Prev Question
Next Question

Leave a Reply

Your email address will not be published. Required fields are marked *