in Education by
___________ is an attack technique where numerous SYN packets are spoofed with a bogus source address which is then sent to an inundated server. (a) SYN flooding attack (b) ACK flooding attack (c) SYN & ACK flooding attack (d) Packet flooding attack I have been asked this question in class test. The origin of the question is Network Models topic in chapter Understanding Network Models for Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
The correct answer is (a) SYN flooding attack The best I can explain: SYN flooding attack is an attack technique where numerous SYN packets are spoofed with a bogus source address which is then sent to an inundated server. The SYN & ACK segments need to begin in a TCP connection.

Related questions

0 votes
    ________ is an attack technique occurs when excess data gets written to a memory block. (a) Over buffering (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Which of the following is a non-technical type of intrusion or attack technique? (a) Reverse Engineering (b ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
0 votes
    Users might invite some bogus virus in his/her system by clicking the ____________ (a) Shareware (b) ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
0 votes
    ___________ is a special form of attack using which hackers' exploit - human psychology. (a) Cross Site Scripting ( ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    ___________ is an activity that takes place when cyber-criminals infiltrates any data source and takes away or alters ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
...