Question

Attackers may get through a specific NAT device by using a form of source routing called _____.
a. a macro
b. spoofing
c. loose source record route
d. multiplexing

Answer

This answer is hidden. It contains 1 characters.