Question

________ is the process of obscuring an attackers source IP address.
A) Backscatter
B) Spoofing
C) IP Flood
D) None of the above

Answer

This answer is hidden. It contains 1 characters.