Briefly describe protocol abuse.

What will be an ideal response?


No matter how hard the Internet's designers try, it seems there is always a way to take advantage of a protocol by using it in ways it was never meant to be used. Anytime you do things with a protocol that it wasn't meant to do and that abuse ends up creating a threat, this is protocol abuse. A classic example involves the Network Time Protocol (NTP).
 

Computer Science & Information Technology

You might also like to view...

The ____________________ text box below the gradient ramp identifies a selected color stop's location, from left to right, on the gradient ramp.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The GetLength( ) method can be called to return the number of rows or columns.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A router receives a packet with a destination address 72.44.69.254?however, no entry in the routing table exists for the network. Which of the following actions will the router take?

A. The packet will be queued while the router queries for an acceptable path to the destination. B. The packet will be dropped as nonroutable. C. The packet will be forwarded out until another router forwards the packet. D. The packet will be forwarded to the next hop address of the default route

Computer Science & Information Technology

In a doubly-linked list, each node contains a pointer to the next node in the list, as well as a pointer to

A) itself. B) the head node. C) the tail node. D) the previous node. E) None of the above

Computer Science & Information Technology