You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are working as a root user on the Linux operating system. Your company is facing an IP spoofing attack.
Which of the following tools will you use to get an alert saying that an upcoming IP packet is being spoofed?
Which of the following is a process of searching unauthorized modems?
Which of the following protocol loggers is used to detect ping sweep?
In which of the following attacks does an attacker use packet sniffing to read network traffic between two parties to steal the session cookie?