What is the name given to a denial of service attack that consumes resources on a device by creating too many unacknowledged TCP sessions?

What is the name given to a denial of service attack that consumes resources on a device by
creating too many unacknowledged TCP sessions?

What is the name given to a denial of service attack that consumes resources on a device by
creating too many unacknowledged TCP sessions?

A.
Syn flooding

B.
TCP flooding

C.
Ack flooding

D.
Ack attack

Explanation:

: This is an attack against a service designed to make the server unavailable. The attack exploits
the limitations of the TCP/IP protocol. A client initiates a TCP connection to a server via a request
with the SYN flag set in the TCP header, the server tries to contact the source with a SYN/ACK
but the real host is unavailable, this makes the 3 way handshake process incomplete. When
multiple Syn attacks floods a server, the server will spend all of its time trying to acknowledge
these connections, and be unavailable to process legitimate requests. See Page 6.4 of CCSE NG
Official Courseware. (VPN1-FW1 Management II NG FP-1).



Leave a Reply 0

Your email address will not be published. Required fields are marked *