Explain how SYN Flood attacks can be controlled.

What will be an ideal response?


Two things can be done:

First, Internet hosts can program their firewalls to block outbound message packets that contain invalid internal IP addresses.

Second, security software can scan for half-open connections that have not been followed by an ACK packet. The clogged ports can then be restored to allow legitimate connections to use them.

PTS: 1

Computer Science & Information Technology

You might also like to view...

A string literal:

a) contains only one character. b) contains numbers rather than letters. c) is a sequence of characters in double quotation marks. d) contains exactly its variable name and nothing else.

Computer Science & Information Technology

Over time, disruptive innovation tends to become less attractive to users in a new market.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Because a(n) ____________________ function can be called explicitly after all objects have been declared, it can be used as a cast independent of its initialization purpose.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You can press the ____ key to open the active page in a browser window.

A. F2 B. F6 C. F8 D. F12

Computer Science & Information Technology