Which of the following attacks would allow an intruder to do port mapping on a company’s internal server from a separate company server on the Internet?

Which of the following attacks would allow an intruder to do port mapping on a company’s internal
server from a separate company server on the Internet?

Which of the following attacks would allow an intruder to do port mapping on a company’s internal
server from a separate company server on the Internet?

A.
SYN flood

B.
Teardrop

C.
Smurf

D.
FTP bounce



Leave a Reply 0

Your email address will not be published. Required fields are marked *

five × two =