Home

Computer science

'



H1 is sending packets to H3 (using HTTP). If a malicious user intercepted the packets between these two hosts at the following locations, then complete the information that the malicious user would observe. For the IP addresses, enter the host or router name. For example, if the answer of "Source IP address:" is that IP of RE, then enter RE into the text field.

Location: Link from RB to RC
Source IP address: Answer


Destination IP address: Answer


Is the data encrypted? Answer

Location: Link on LAN from RD to H3
Source IP address: Answer


Destination IP address: Answer


Is the data encrypted? Answer

'

Answer