How does a SYN scan work?
What will be an ideal response?
In a normal TCP session, a packet is sent to another computer with the SYN flag set. The receiving computer sends back a packet with the SYN/ACK flag set, indicating an acknowledgment. The sending computer then sends a packet with the ACK flag set. If the port to which the SYN packet is sent is closed, the computer responds to the SYN packet with an RST/ACK packet. If a SYN/ACK packet is received by an attacker's computer, it quickly responds with an RST/ACK packet, closing the session. This is done so that a full TCP connection is never made and logged as a transaction. In this sense, it is "stealthy." After all, you don't want a transaction to be logged showing the IP address that connected to the attacked computer.
You might also like to view...
Answer the following statements true (T) or false (F)
1) Insertion into a linked list takes the same number of operations no matter where the insertion occurs 2) A stack is a first-in-first-out data structure. 3) A queue is first-in-first-out data structure. 4) Most applications that use a stack will store a struct or class object on the stack.
Report ________ are a method of visually displaying data in reports
Fill in the blank(s) with correct word
If a column of data holds the letter grades for a class, the ________ function could be used to determine how many students had a grade of "A"
A) COUNTIF B) MEDIAN C) IF D) SUM
Once workbook sharing is removed, the contents of the tracking log are _______, and there is no way to retrieve the history of edits made to the document.
A. saved B. copied C. erased D. backed up