When a session is initiated between the Transport Control Program (TCP) client and server in a network, a very small buffer space exist to handle the usually rapid “hand-shaking” exchange of messages that sets up the session. What kind of attack exploits this functionality?
A.
Buffer Overflow
B.
SYN Attack
C.
Smurf
D.
Birthday Attack
Explanation:
Reference: Security + (SYBEX) page 530