1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scoundrel [369]
4 years ago
11

SYN scanning is a tactic that a malicious hacker (or cracker) can use to determine the state of a communications port without es

tablishing a full connection. This approach, one of the oldest in the repertoire of crackers, is sometimes used to perform denial-of-service (DoS) attacks. SYN scanning is also known as half-open scanning.In SYN scanning, the hostile client attempts to set up a TCP/IP connection with a server at every possible port. This is done by sending a SYN (synchronization) packet, as if to initiate a three-way handshake, to every port on the server. If the server responds with a SYN/ACK (synchronization acknowledged) packet from a particular port, it means the port is open. Then the hostile client sends an RST (reset) packet. As a result, the server assumes that there has been a communications error, and that the client has decided not to establish a connection. The open port nevertheless remains open and vulnerable to exploitation. If the server responds with an RST (reset) packet from a particular port, it indicates ___________________________________
Computers and Technology
1 answer:
Mashutka [201]4 years ago
8 0

Answer:

A closed port that can not receive request from authorized users.

Explanation:

Networks comprises of end devices, routing and switching devices, servers, technical control devices etc. The communication and interconnection of these devices makes up a secure and resourceful network.

Attackers can exploit loopholes in networks to steal information. The attackers uses the SYN scanning or cracking technique to implement the DOS or denial of service attack.

DOS is used to flood ports on a server in a network, preventing authorized user access, as they steal information to avoid detection.

You might be interested in
What the heck is a motherboard and why is my computer not working when i take it out
Monica [59]
Ok 1. ur not supposed to take a motherboard out of a computer and 2. a mother board technically controls everything or what u do in ur computer
7 0
3 years ago
Briefly describe the fundamental differences between project-based and product-based Software Engineering.
andrew11 [14]

Answer:

Product-based companies make a specific product and try to market it as a solution. But project-based companies create a solution based on many products and sell it as a packaged solution to a particular need or problem.

Explanation:

hope this helps

8 0
3 years ago
Scrie un program care citind varstele a 2 copii afiseaza care dintre ei este cel mai mare si cu cat. Exemplu: Pentru varstele 5
murzikaleks [220]

Answer:

primul_copil = int(input("Introduceți vârsta primului copil: "))

aldoilea_copil = int(input("Introduceți vârsta celui de-al doilea copil: "))

def copilmai_mare(varsta1, varsta2):

   if varsta1 > varsta2:

       diferenta = varsta1 - varsta2

       print("copilul mai mare este varsta1 cu diferența de vârstă de: ", diferenta )

   else:

       diferenta = varsta2 - varsta1

       print("copilul mai mare este varsta2 cu diferența de vârstă de: ", diferenta )

copilmai_mare(primul_copil, aldoilea_copil)

Explanation:

Programul python de mai sus definește o funcție "copilmai_mare" care ia două argumente "varsta1" și "varsta2". Diferența dintre vârstele copiilor este comparată, iar cel mai mare copil și diferența sunt tipărite pe ecran.

5 0
3 years ago
What type of network is a private network that belongs to an organization that can only be accessed by approved internal users?
denpristay [2]
A domain network would be the answer
6 0
3 years ago
In procedural programming, where does the flow of control usually route from the main function?
Zinaida [17]

Answer:

Subroutine or called function.

Explanation:

Procedural programming is a programming techniques of creating modular divisions between lines of code, with a provision to call and run a block of code at any given instance in the program.

A program flow control breaks at will from the main function to a target defined function or subroutine, which returns a value back to the normal flow of the program. It uses conditional and loop statement to achieve its task.

6 0
3 years ago
Other questions:
  • Why people needs soft skills in the era of high technology.
    13·1 answer
  • in c++, what happends when i add 1 to the RAND_MAX then take rand() deivded by (RAND_MAX+1)?if my purpose is to take out a rando
    11·1 answer
  • What is an example of a functional organizational structure?
    10·2 answers
  • Which is the correct process for inserting a blank worksheet?
    11·2 answers
  • A magnetic disk drive requires a motor to position a read/write head over tracks of data on a spinning disk, (see fig. e4.4 in d
    8·1 answer
  • What does a capitalist economy allow people to do?
    11·2 answers
  • 1. Why is it important for IT technicians to keep documentation on computers for which they are
    13·1 answer
  • What is the main difference between weathering, erosion and leaching​
    9·1 answer
  • "Jan23" can be stored using which data type? O an alphanumeric string O a boolean operator o characters floating point numbers​
    13·2 answers
  • Give two logics how a computer is better then man ​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!