View all questions & answers for the GSEC exam
What does an attacker need to consider when attempting an IP spoofing attack that relies on guessing Initial Sequence Numbers (ISNs)?
These attacks work against relatively idle servers.
These attacks rely on a modified TCP/IP stack to function.
These attacks can be easily traced back to the source.
These attacks only work against Linux/Unix hosts.
Submit