Question map
Not attempted Correct Incorrect ★ Bookmarked
Loading…
Q19 (CDS-II/2010) Science & Technology › ICT, AI, Cybersecurity & Emerging Tech › Cybersecurity threats Answer Verified

In IP Spoofing

Result
Your answer: —  Â·  Correct: B
Explanation

IP spoofing is a malicious technique where a threat actor hides the true source of IP packets to disguise their identity [t3]. The attacker creates packets with a forged source IP address to impersonate a trusted computer system or a different machine [t3][t5]. By manipulating the packet header, the destination computer perceives the incoming data as originating from a legitimate or trusted source, allowing the attacker to bypass security measures and gain unauthorized access [t8]. This method is frequently used to launch Distributed Denial of Service (DDoS) attacks, Man-in-the-Middle (MitM) attacks, and to evade detection by masking the attacker's true electronic location [t4][t5]. While other options describe general cybercrime or security measures like cryptography [t2], option 2 specifically defines the core mechanism of IP spoofing: identifying and assuming the identity of a trusted machine to mask one's own true identity.

How others answered
Each bar shows the % of students who chose that option. Green bar = correct answer, blue outline = your choice.
Community Performance
Out of everyone who attempted this question.
75%
got it right
✓ Thank you! We'll review this.

SIMILAR QUESTIONS

NDA-I · 2013 · Q62 Relevance score: -3.62

Which one among the following has completed thirty years of its development on 1st January, 2013?

CAPF · 2012 · Q14 Relevance score: -3.84

Wi-Fi in a computer implies

CAPF · 2022 · Q95 Relevance score: -3.89

Consider the following statements with reference to the latest guidelines issued by the Indian Computer Emergency Response Team (CERT-In): 1. Data centres and service providers shall compulsorily report cyber security breaches within 24 hours. 2. Virtual Private Network providers shall retain user data for at least five years and share records with authorities when required. Which of the statements given above is/are correct?

CDS-II · 2025 · Q83 Relevance score: -4.32

Assuming the computer is a 4-bit computer, what result is produced after subtraction of 3 from 5 using the 2's complement representation ?

CAPF · 2022 · Q10 Relevance score: -4.33

Which one of the following protocols is not an application layer of the TCP/IP model?