All of the following are true of a SYN flood attack, except:
a.The initial TCP connection request sent from the attacker is spoofed. |
b.It tries to exhaust the resources of the attacked computer by generating numerous half-open TCP sockets |
c.This is an example of a denial of service (DoS) attack |
d.It depends on guessing the next initial sequence number (ISN) of the attacked machine. |
Get Answers For Free
Most questions answered within 1 hours.