which an attacker deliberately violates the three-way handshake and opens a large number of half-open TCP connections.The signature for SYN Flood attack is:
What would best be defined as a security test on services against a known vulnerability database using an automated tool?