1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scoundrel [369]
3 years ago
11

SYN scanning is a tactic that a malicious hacker (or cracker) can use to determine the state of a communications port without es

tablishing a full connection. This approach, one of the oldest in the repertoire of crackers, is sometimes used to perform denial-of-service (DoS) attacks. SYN scanning is also known as half-open scanning.In SYN scanning, the hostile client attempts to set up a TCP/IP connection with a server at every possible port. This is done by sending a SYN (synchronization) packet, as if to initiate a three-way handshake, to every port on the server. If the server responds with a SYN/ACK (synchronization acknowledged) packet from a particular port, it means the port is open. Then the hostile client sends an RST (reset) packet. As a result, the server assumes that there has been a communications error, and that the client has decided not to establish a connection. The open port nevertheless remains open and vulnerable to exploitation. If the server responds with an RST (reset) packet from a particular port, it indicates ___________________________________
Computers and Technology
1 answer:
Mashutka [201]3 years ago
8 0

Answer:

A closed port that can not receive request from authorized users.

Explanation:

Networks comprises of end devices, routing and switching devices, servers, technical control devices etc. The communication and interconnection of these devices makes up a secure and resourceful network.

Attackers can exploit loopholes in networks to steal information. The attackers uses the SYN scanning or cracking technique to implement the DOS or denial of service attack.

DOS is used to flood ports on a server in a network, preventing authorized user access, as they steal information to avoid detection.

You might be interested in
By default, which of these traffic source dimensions does google analytics capture for each user that visits your website?
natta225 [31]

The question above has multiple choices as listed;

<span />a. Source and Medium<span>
</span>

<span>b. Campaign and Ad Content</span>
<span />

<span>c. Campaign and Medium
</span><span>
</span><span>d. Source, Medium, Campaign, and Ad Content
</span>
<span />

<span>The correct answer is A. Source and Medium</span>

Source and medium combines the dimensions source and medium. Anyone referred to a website has an origin or a source. Examples of possible sources include Google, Facebook.com, and direct for those who typed your URL directly. Every referral, on the other hand, has a medium and possible examples of medium include organic, cost per click, referral, email, and none.






5 0
2 years ago
Who<br> invented the term “debugging”?
Black_prince [1.1K]

Grace Murray Hopper invented it

8 0
2 years ago
Read 2 more answers
HELP PLSSSSS!!! I WILL MARK BRAINLIEST FOR THE FIRST AND CORRECT ANSWER!!!
dalvyx [7]
The answer you are looking for would be A. Hardware can be an external tool, where as software is an internal tool. Hope this helped!
6 0
3 years ago
Read 2 more answers
: Describe the type of gameplay seen during early video games (ex. Spacewar!, Pong).
Alexeev081 [22]

Answer:

Computer scientists began building rudimentary games and simulations on mainframe computers in the 1950s and 1960s, with MIT's Spacewar! in 1962 being one of the first such games to be played with a video display. The first consumer-ready video game hardware arrived in the early 1970s, with the Magnavox Odyssey, the first home video game system, and the first arcade video games from Atari, Computer Space and Pong, the latter of which was later transformed into a home console version. Pong's success in arcades and at home prompted numerous firms to create clones of the game, resulting in a market contraction in 1978 owing to oversaturation and a lack of innovation.

8 0
2 years ago
A common use-case for dictionaries is to store word counts. Let's modify our program below to store the count for each unique wo
baherus [9]

Answer:

word_count={}

for i in text.split:

        if i in word_count:

                word_count[i]+=1

         else:

                 word_count[i]=1

print word_count

8 0
3 years ago
Other questions:
  • When you copy text, the selected text is copied from the original location and placed on the
    9·1 answer
  • A ____ is a collection of computers and users that are identified by a common security database. workgroup controller segment do
    7·1 answer
  • Which clauses in the Software Engineering Code of Ethics are upheld by a whistleblower (check all that apply). "Respect confiden
    15·1 answer
  • Does anyone know why I get notifications on Brainly that say they are from 4 hours ago even though they were just answered
    9·1 answer
  • One of the functions of an IDE is to check for: flowchart errors. Syntax errors. memory errors X input and output.​
    12·2 answers
  • Choose the answer that best completes the
    8·2 answers
  • You should always be afraid to use the internet<br><br> True or false?
    11·1 answer
  • What time is it NOW??
    11·2 answers
  • Ema Company for business .
    14·1 answer
  • What starts with p and ends with orn
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!