Which of the following best describes the protocol activity shown in the diagram, along with the most likely potential threat that accompanies this protocol?

Consider the following diagram:

Which of the following best describes the protocol activity shown in the diagram, along with the
most likely potential threat that accompanies this protocol?

Consider the following diagram:

Which of the following best describes the protocol activity shown in the diagram, along with the
most likely potential threat that accompanies this protocol?

A.
The ICMP Time Exceeded message, with the threat of a denial-of-service attack

B.
The SIP three-way handshake, with the threat of a buffer overflow

C.
The TCP three-way handshake, with the threat of a man-in-the-middle attack

D.
The DNS name query, with the threat of cache poisoning



Leave a Reply 1

Your email address will not be published. Required fields are marked *


test

test

My answer is C.

We can find that there are SYN flag and ACK, which are proofs that this is a TCP handshake. It has three steps. Step one, the clients ask for a port. Step two, the server says okay. Step three, the client answers okay.

The danger of man-in-the-middle is that, there can be a host C. The host C acts as A for B, and B for A, therefore it leads to security problems. You should use strong encryption to solve this problem.