Which of the following attacks would allow an intruder to do port mapping on a company’s internal
server from a separate company server on the Internet?
A.
SYN flood
B.
Teardrop
C.
Smurf
D.
FTP bounce
Explanation:
FTP bounce attack is an exploit of the FTP protocol whereby an attacker is able to
use the PORT command to request access to ports indirectly through the use of the victim
machine as a middle man for the request.