Which of the following attacks would allow an intruder to do port mapping on a company’s internal server from a separate company server on the Internet?

Which of the following attacks would allow an intruder to do port mapping on a company’s internal
server from a separate company server on the Internet?

Which of the following attacks would allow an intruder to do port mapping on a company’s internal
server from a separate company server on the Internet?

A.
SYN flood

B.
Teardrop

C.
Smurf

D.
FTP bounce

Explanation:
FTP bounce attack is an exploit of the FTP protocol whereby an attacker is able to
use the PORT command to request access to ports indirectly through the use of the victim
machine as a middle man for the request.



Leave a Reply 0

Your email address will not be published. Required fields are marked *