Change set

Pick exam & year, then Go.

Question map
Not attempted Correct Incorrect ★ Bookmarked
Loading…
Q19 (CDS-II/2010) Science & Technology › ICT, AI, Cybersecurity & Emerging Tech › Cybersecurity threats Answer Verified

In IP Spoofing

Result
Your answer: —  Â·  Correct: B
Explanation

IP spoofing is a malicious technique where a threat actor hides the true source of IP packets to disguise their identity [t3]. The attacker creates packets with a forged source IP address to impersonate a trusted computer system or a different machine [t3][t5]. By manipulating the packet header, the destination computer perceives the incoming data as originating from a legitimate or trusted source, allowing the attacker to bypass security measures and gain unauthorized access [t8]. This method is frequently used to launch Distributed Denial of Service (DDoS) attacks, Man-in-the-Middle (MitM) attacks, and to evade detection by masking the attacker's true electronic location [t4][t5]. While other options describe general cybercrime or security measures like cryptography [t2], option 2 specifically defines the core mechanism of IP spoofing: identifying and assuming the identity of a trusted machine to mask one's own true identity.

How others answered
Each bar shows the % of students who chose that option. Green bar = correct answer, blue outline = your choice.
Community Performance
Out of everyone who attempted this question.
93%
got it right
✓ Thank you! We'll review this.

SIMILAR QUESTIONS

5 Cross-Linked PYQs

UPSC repeats concepts across years. Login to see how this question connects to 5 others.

Login with Google