Explain a SYN flood attack.
What will be an ideal response?
Normally user establishes a connection on the Internet via a three-way handshake. The connecting server sends an initiation code called a SYN (SYNchronize) packet to the receiving server. The receiving server then acknowledges the request by returning a SYNchronize-AC Knowledge (SYN-AC K) packet. Finally, the initiating host machine responds with an ACK packet code. The SYN flood attack is accomplished by not sending the final acknowledgment to the server's SYNACK response, which causes the server to keep signaling for acknowledgement until the server times out.
The individual or organization perpetrating the SYN flood attack transmits hundreds of SYN packets to the targeted receiver, but never responds with an ACK to complete the connection. As a result, the ports of the receiver's server are clogged with incomplete communication requests that prevent legitimate transactions from being received and processed. Organizations under attack may, thus, be prevented from receiving Internet messages for days at a time.
PTS: 1
You might also like to view...
A hard disk uses ____________________ storage technology.
Fill in the blank(s) with the appropriate word(s).
What should you do if you receive an e-mail you suspect might contain a virus?
A) Open the e-mail to see if it indeed contains a virus. B) Forward the e-mail to a friend and ask them to check if it contains a virus. C) Contact the IT department and ask someone to check if the e-mail is legitimate. D) Delete the e-mail.
________ are areas of text or images that are aligned horizontally or vertically
Fill in the blank(s) with correct word
A form handler must interact with and add information to a database that is stored on the company's server.
Answer the following statement true (T) or false (F)