ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 77 Topic 8 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 77 Topic 8 Discussion

312-50v13 Exam Topic 8 Question 77 Discussion:
Question #: 77
Topic #: 8

Jude, a pen tester working in Keiltech Ltd., performs sophisticated security testing on his company's network infrastructure to identify security loopholes. In this process, he started to circumvent the network protection tools and firewalls used in the company. He employed a technique that can create forged TCP sessions by carrying out multiple SYN, ACK, and RST or FIN packets. Further, this process allowed Jude to execute DDoS attacks that can exhaust the network resources. What is the attack technique used by Jude for finding loopholes in the above scenario?


A.

UDP flood attack


B.

Ping-of-death attack


C.

Spoofed session flood attack


D.

Peer-to-peer attack


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.