QUESTION 8 To hijack a TCP connection, it is necessary for the attacker to perform a number of tasks. Select the best answer from what is given below. (Note: There is only one correct answer.)
1. Monitor and intercept packets between victim hosts
2. Launch a successful SYN flooding attack to mute a victim host for the attacker to impersonate
3. Guess or derive correctly TCP sequence numbers
4. Carry out a successful denial of service attack on the victim host to be impersonated so that not even UDP packets can go through
5. All of the above
6. All of the above except 4
07. None of the above
The correct answer is All of the above
Reason : To hijack the TCP connection the hijacker must identitfy the IP addresses of both (the host and the client's) network by attacking the the middle of the transmission
For tcp hijacking we need to monitor the intercept packets between victim hosts
We should Launch a successful SYN flooding attack to mute a victim host for the attacker to impersonate
Guess or derive correctly TCP sequence numbers
Carry out a successful denial of service attack on the victim host to be impersonated so that not even UDP packets can go through
Please do like
Get Answers For Free
Most questions answered within 1 hours.