Describe a SYN attack.

What will be an ideal response?


An attacker sends many TCP SYN packets to a host opening many TCP sessions. The excessive number of TCP sessions keeps other users from accessing services.

Computer Science & Information Technology

You might also like to view...

Click any pixel on the canvas, and the Magic Wand tool selects other pixels based on continuity- the similarity of their color.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A GUI typically includes all of the following EXCEPT ________

A) icons B) a desktop C) hardware D) a pointer

Computer Science & Information Technology

An email message that is intended to include complex formatting or graphics needs to have the ________________ protocol enabled

a. POP b. IMAP c. HTML d. ICMP

Computer Science & Information Technology

?The Smart Lookup tab is found within the Insights group on the Review tab.

A. Yes B. No

Computer Science & Information Technology