Describe a SYN attack.

What will be an ideal response?

An attacker sends many TCP SYN packets to a host opening many TCP sessions. The excessive number of TCP sessions keeps other users from accessing services.

Computer Science & Information Technology

You might also like to view...

On a line chart, the y-axis is also known as the:

A) category axis. B) legend axis. C) base axis. D) value axis.

Computer Science & Information Technology

The thread remains in the born state until the program invokes the thread’s________method, which places the thread in the ready state (sometimes called the runnable state) and immediately returns control to the calling thread.

a) run. b) begin. c) init. d) start.

Computer Science & Information Technology