NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
A ____ attack is when a victim is flooded with SYN packets in an attempt to make many half-open TCP connections.
|
SYN flood
|
|
Ping flood
|
|
HTTP flood
|
|
None of the above
|
Explanation:
Detailed explanation-1: -SYN flood attacks work by exploiting the handshake process of a TCP connection.
Detailed explanation-2: -As part of the handshake, the client and server exchange messages to establish a communication channel. The attack involves having a client repeatedly send SYN–which stands for synchronization–packets to every port on a server using fake IP addresses.
There is 1 question to complete.