If an attacker in a SYN flood attack uses someone else’s valid host address…

If an attacker in a SYN flood attack uses someone else’s valid host address as the source address, the
system under attack will send a large number of Synchronize/Acknowledge (SYN/ACK) packets to the

If an attacker in a SYN flood attack uses someone else’s valid host address as the source address, the
system under attack will send a large number of Synchronize/Acknowledge (SYN/ACK) packets to the

A.
default gateway.

B.
attacker’s address.

C.
local interface being attacked.

D.
specified source address.



Leave a Reply 0

Your email address will not be published. Required fields are marked *

four + 6 =