Which of the following attacks would allow an intruder to do port mapping on a company’s internal server from a separate company server on the Internet?

Which of the following attacks would allow an intruder to do port mapping on a company’s internal server from
a separate company server on the Internet?

Which of the following attacks would allow an intruder to do port mapping on a company’s internal server from
a separate company server on the Internet?

A.
SYN flood

B.
Teardrop

C.
Smurf

D.
FTP bounce



Leave a Reply 1

Your email address will not be published. Required fields are marked *

5 × two =


Shirley Mathew

Shirley Mathew

smurf attack floods network w/ BA and spoofs victims IP add

SYN flood- attacker sends a succession of SYN requests to a target’s system to consume server resources

teardrop attack- sends mangled IP fragments with overlapping, over-sized payloads to the target machine

FTP bounce attack- an exploit of the FTP protocol whereby an attacker is able to use the PORT command to request access to ports indirectly through the use of the victim machine as a middle man for the request.