Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Attacker real IP: 1.1.1.1 Internet-Router source: 3.3.3.3 destination: 2.2.2.2 I

ID: 3739005 • Letter: A

Question

Attacker real IP: 1.1.1.1 Internet-Router source: 3.3.3.3 destination: 2.2.2.2 IP TCP IP TCP Internet source (spoofed): 3.3.3.3 (spoofed) 3.333 deštination: 2.2.2.2 source: 2.2.2.2 destination: 3.3.3.3 trusted Host IP: 3..3.3 Victim IP: 2.2.2.2 (might be target of Dos-attack) (possible security breach) .Tuc.talsc lft" Trusted Host regled, the mply would go.o the Amacher etrue false The Victim reoeived a memage from 1.1.1.1 but thinds it is from 3333 e tnie false The Internet Router coeverted the destination adiress from 1.1.1.1 2222 tnue faise The Amacher will get a reply from he trusted Host

Explanation / Answer

Answer.)

1. true. Yes, if the trusted host replies, the reply would go to the Attacker.

2. true. As per ip spoofing, the vixtim would receive a message from 1.1.1.1 but it seems that it is from 3.3.3.3

3. false.

4. true.