Multiple Choice
If a criminal reconfigures his computer with someone else's IP address to conceal his identity, the local router would have an entry in its _________showing that criminal's actual Mac address associated with somebody else's IP address.
A) Host table
B) BOOTP
C) CMOS
D) ARP table
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q2: What is the maximum cable length for
Q3: It is necessary to physically tap a
Q4: Although ARP is part of TCP/IP, it
Q5: What information is contained in the padding
Q7: MAC addresses can be associated with a
Q8: A common approach to collecting digital evidence
Q9: The netstat command can be used to
Q10: The form of ARP that ATM uses
Q11: What is the maximum cable length for
Q21: Which of the following tools can reconstruct