COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A ____ attack is when a victim is flooded with SYN packets in an attempt to make many half-open TCP connections.
A
SYN flood
B
Ping flood
C
HTTP flood
D
None of the above
Explanation: 

Detailed explanation-1: -SYN flood attacks work by exploiting the handshake process of a TCP connection.

Detailed explanation-2: -As part of the handshake, the client and server exchange messages to establish a communication channel. The attack involves having a client repeatedly send SYN–which stands for synchronization–packets to every port on a server using fake IP addresses.

There is 1 question to complete.