Which of the following is true for SYN flooding attack?
a. It exploits the accumulation of TCP half-open connections.
b. It floods a large number of ICMP echo packets in a synchronous way.
c. It exhausts resources on the victim machine, and prevents genuine requests from being processed.
d. All of these.
Answers
Answered by
13
Explanation:
b. It floods a large number of ICMP echo packets in a synchronous way.
Answered by
0
Answer:
From the above given options, the statement which is true about SYN flooding attack is - option d) all of these.
SYN flooding attack exploits the TCP connection of host's computer to be able to consume resources from server that too from the target computer.
Half opened TCP connections that are accumulated are being exploited by SYN flooding attack.
In a synchronous way huge number of ICMP echo packets are being flooded by SYN flooding attack.
Processing of requests that are genuine are being blocked by SYN flooding .
Similar questions