Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 198 Topic 20 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 198 Topic 20 Discussion

312-50v13 Exam Topic 20 Question 198 Discussion:
Question #: 198
Topic #: 20

When a normal TCP connection starts, a destination host receives a SYN (synchronize/start) packet from a source host and sends back a SYN/ACK (synchronize acknowledge). The destination host must then hear an ACK (acknowledge) of the SYN/ACK before the connection is established. This is referred to as the "TCP three-way handshake." While waiting for the ACK to the SYN ACK, a connection queue of finite size on the destination host keeps track of connections waiting to be completed. This queue typically empties quickly since the ACK is expected to arrive a few milliseconds after the SYN ACK.

How would an attacker exploit this design by launching TCP SYN attack?


A.

Attacker generates TCP SYN packets with random destination addresses towards a victim host


B.

Attacker floods TCP SYN packets with random source addresses towards a victim host


C.

Attacker generates TCP ACK packets with random source addresses towards a victim host


D.

Attacker generates TCP RST packets with random source addresses towards a victim host


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.