1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scoundrel [369]
4 years ago
11

SYN scanning is a tactic that a malicious hacker (or cracker) can use to determine the state of a communications port without es

tablishing a full connection. This approach, one of the oldest in the repertoire of crackers, is sometimes used to perform denial-of-service (DoS) attacks. SYN scanning is also known as half-open scanning.In SYN scanning, the hostile client attempts to set up a TCP/IP connection with a server at every possible port. This is done by sending a SYN (synchronization) packet, as if to initiate a three-way handshake, to every port on the server. If the server responds with a SYN/ACK (synchronization acknowledged) packet from a particular port, it means the port is open. Then the hostile client sends an RST (reset) packet. As a result, the server assumes that there has been a communications error, and that the client has decided not to establish a connection. The open port nevertheless remains open and vulnerable to exploitation. If the server responds with an RST (reset) packet from a particular port, it indicates ___________________________________
Computers and Technology
1 answer:
Mashutka [201]4 years ago
8 0

Answer:

A closed port that can not receive request from authorized users.

Explanation:

Networks comprises of end devices, routing and switching devices, servers, technical control devices etc. The communication and interconnection of these devices makes up a secure and resourceful network.

Attackers can exploit loopholes in networks to steal information. The attackers uses the SYN scanning or cracking technique to implement the DOS or denial of service attack.

DOS is used to flood ports on a server in a network, preventing authorized user access, as they steal information to avoid detection.

You might be interested in
Default color html ​
Marrrta [24]

Answer:

black for font...

and

white for bg color

Explanation:

i think this is enough for ur question...

3 0
3 years ago
guys im so heartbroken. so i quit art. heres my laST piece of art i did. it took me a month. im burning it tonight. i quit art..
Helga [31]

Answer:

Ok

hsjsbsjwiqnsbsjsowiwi

5 0
3 years ago
Read 2 more answers
Which measurement symbol is this?<br><br><br>PLS HELP ME​
andreev551 [17]

Answer:

hi! can you please leave the symbol so I can help you??

Explanation:

6 0
3 years ago
Read 2 more answers
Can somebody help me?
Alika [10]
Are you signed in? if not then try to reset your device and see if you can get in there I hope this helped you if not plz let meh know :P 
5 0
4 years ago
Interactive sites where users write personal topics and comments to a threadded discussion are called?
Eddi Din [679]
The correct answer would be Forums
5 0
4 years ago
Other questions:
  • g The reciprocal Fibonacci constant ψ is defined by the infinite sum: ψ=∑n=1 [infinity] 1 Fn Where Fn are the Fibonacci numbers
    7·1 answer
  • 1. You want to schedule a weekly analysis for the Windows servers in your data center. The command should run as a scheduled job
    15·1 answer
  • Please I need all the help I can get Thank You So Much
    14·1 answer
  • Being technologically literate requires being able to ______.
    11·2 answers
  • Alcohol does not affect the driver judgement
    8·2 answers
  • ___________ is the ability of a product to satisfy a customer.
    11·1 answer
  • Drag the tiles to the correct boxes to complete the pairs.
    6·1 answer
  • Desirable workplace habits and skills include:
    14·1 answer
  • What does XD mean? I keep seeing people say it and I dont know what it means
    6·2 answers
  • Hey IM new uh what is this?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!