1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scoundrel [369]
3 years ago
11

SYN scanning is a tactic that a malicious hacker (or cracker) can use to determine the state of a communications port without es

tablishing a full connection. This approach, one of the oldest in the repertoire of crackers, is sometimes used to perform denial-of-service (DoS) attacks. SYN scanning is also known as half-open scanning.In SYN scanning, the hostile client attempts to set up a TCP/IP connection with a server at every possible port. This is done by sending a SYN (synchronization) packet, as if to initiate a three-way handshake, to every port on the server. If the server responds with a SYN/ACK (synchronization acknowledged) packet from a particular port, it means the port is open. Then the hostile client sends an RST (reset) packet. As a result, the server assumes that there has been a communications error, and that the client has decided not to establish a connection. The open port nevertheless remains open and vulnerable to exploitation. If the server responds with an RST (reset) packet from a particular port, it indicates ___________________________________
Computers and Technology
1 answer:
Mashutka [201]3 years ago
8 0

Answer:

A closed port that can not receive request from authorized users.

Explanation:

Networks comprises of end devices, routing and switching devices, servers, technical control devices etc. The communication and interconnection of these devices makes up a secure and resourceful network.

Attackers can exploit loopholes in networks to steal information. The attackers uses the SYN scanning or cracking technique to implement the DOS or denial of service attack.

DOS is used to flood ports on a server in a network, preventing authorized user access, as they steal information to avoid detection.

You might be interested in
Compare and contrast the leadership and leadership and management style of apple and Samsung ​
Ipatiy [6.2K]

Answer:

Samsung's business model has focused on vertically integrating supply chains and ramping up production volume. Apple has made a business strategy of focusing on design and user experience while outsourcing elements such as manufacturing. The two companies have found themselves engaged in legal battles over intellectual property and patent fights.

Hope this helps!

4 0
2 years ago
The objective of this task is to use Scapy to estimate the distance, in terms of number of routers, between your VM and a select
Aleksandr [31]

Answer:

answer b

is correct

3 0
3 years ago
Who began digitizing books on a massive scale and putting them online?
Sholpan [36]

The answer is Google Cooperation.

Google began the mass digitization of bound volumes of books and as a result, it is getting widespread media attention. Google has had, and is still keeping up with its intention to digitize all the books across major USA libraries. Its intention is not to provide a reading environment, but rather create an online index to books in libraries and bookstores.

4 0
3 years ago
When the tcp\ip translates a network layer address into a data link layer address (after not finding an entry for the network la
Pavel [41]
When the network stack translates an IP address (network address) to a MAC address (data link address) it sends a broadcast using ARP to all devices on the subnet asking who has the specified IP address.  The device with that IP address will then respond with it's MAC address to the ARP message's source.

With this in mind the answer to your question would either be broadcast or ARP request depending on what you have been learning in class.
6 0
3 years ago
Which of the following is NOT true about a flow chart?
SCORPION-xisa [38]
I think the answer is A
4 0
3 years ago
Other questions:
  • An IT technician has manually configured an IP address on a laptop for a new employee. Each time the employee tries to connect t
    8·1 answer
  • Although the battery on your smartphone is fully charged, it drains quickly. In some instances when the phone shows that the bat
    12·1 answer
  • Correspondence involves verbal communication. True False
    6·2 answers
  • The set of communications rules for exchanging information electronically on the internet is called the ________.
    10·1 answer
  • When using a function to preform a calculation how would you select the range of numbers to use
    13·1 answer
  • Write a program name Dollars that calculates and displays the conversion of an entered number of dollars into currency denominat
    11·1 answer
  • Let’s say you’re having trouble locating a file on your computer. Which of the following are good places to look for the file?
    14·1 answer
  • Which option is used to ensure the integrity and authenticity of a Word document but requires additional services to be availabl
    5·2 answers
  • A source mainly provides <br> from a text or piece of media.
    6·2 answers
  • If you have limited means, you...?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!