Answer: 65
Answer: 65
Answer: MITM
Answer: 389
Answer: Local networking
Answer: Cyber Security Enhancement Act 2002
Answer: nmap -sX -sneaky
Answer: To overload a system so it is no longer operational
Answer: IP Network Browser
Answer: Confidentiality
Answer: Comparing the TTL values of the actual and spoofed addresses
Answer: Exploit
Answer: Computer-based