1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scoundrel [369]
4 years ago
11

SYN scanning is a tactic that a malicious hacker (or cracker) can use to determine the state of a communications port without es

tablishing a full connection. This approach, one of the oldest in the repertoire of crackers, is sometimes used to perform denial-of-service (DoS) attacks. SYN scanning is also known as half-open scanning.In SYN scanning, the hostile client attempts to set up a TCP/IP connection with a server at every possible port. This is done by sending a SYN (synchronization) packet, as if to initiate a three-way handshake, to every port on the server. If the server responds with a SYN/ACK (synchronization acknowledged) packet from a particular port, it means the port is open. Then the hostile client sends an RST (reset) packet. As a result, the server assumes that there has been a communications error, and that the client has decided not to establish a connection. The open port nevertheless remains open and vulnerable to exploitation. If the server responds with an RST (reset) packet from a particular port, it indicates ___________________________________
Computers and Technology
1 answer:
Mashutka [201]4 years ago
8 0

Answer:

A closed port that can not receive request from authorized users.

Explanation:

Networks comprises of end devices, routing and switching devices, servers, technical control devices etc. The communication and interconnection of these devices makes up a secure and resourceful network.

Attackers can exploit loopholes in networks to steal information. The attackers uses the SYN scanning or cracking technique to implement the DOS or denial of service attack.

DOS is used to flood ports on a server in a network, preventing authorized user access, as they steal information to avoid detection.

You might be interested in
What does limited access to a document mean?
Licemer1 [7]
The second last one is the answer i think
7 0
4 years ago
Read 2 more answers
Where would you look to find an article on recent fashion trends?
Zina [86]
The answer is letter A. 

Who's Who Fashion Articles showcase trends in fashion and the latest brands in the fashion industry. You can look up articles about fashion and the possible merchandises that would spice up your fashion ideas from their website or print materials.
8 0
3 years ago
If you would like to give another user permissions on your mailbox or to particular folders within your mailbox, which role shou
olga2289 [7]

Answer:

assignee

Explanation:

5 0
3 years ago
Where is NumPy used?
Svetradugi [14.3K]

Explanation:

The ndarray (NumPy Array) is a multidimensional array used to store values of same datatype. These arrays are indexed just like Sequences, starts with zero.

7 0
4 years ago
Read 2 more answers
Assume that a function with this header: function amountSaved(price, discountRate, salesTaxRate) already exists. Write a single
Levart [38]

Answer:

let saved = amountSaved(12, 0.9, 0.06);

Explanation:

By presuming there is a JavaScript function <em>amountSaved() </em>that takes three input parameters, <em>price</em>, <em>discountRate</em> & <em>salesTaxRate</em>.  To call the function, just simply write the function name, <em>amountSaved</em> followed with a pair of parenthesis. Within the parenthesis, include three testing values, 12, 0.9, 0.06 as arguments. These argument values will be held by the three parameter <em>price</em>, <em>discountRate</em> and <em>salesTaxRate</em>, respectively.

The function will operate on the three input values and return the result to the main program where the returned result is assigned to a variable name <em>saved</em>.

4 0
3 years ago
Other questions:
  • The formatting option functions like space bar. However instead of moving one space at a time, it allows you to move your text i
    7·1 answer
  • Oop skskskssksksksksk
    15·2 answers
  • As long as users refer to files in the ____ directory, they can access the files without entering the absolute filename.
    10·1 answer
  • Mario wants to use computer.what is the first thing needs to know<br><br>​
    6·1 answer
  • A common use-case for dictionaries is to store word counts. Let's modify our program below to store the count for each unique wo
    9·1 answer
  • What is working with others to find a mutually agreeable outcome?
    8·2 answers
  • 3. Write a program that inputs 4 hexadecimal digits as strings (example 7F), converts the string digits to a long – use strtol(i
    11·1 answer
  • A ----------------has the least flexibility and is best suited for mass production. It has an arrangement of machines that proce
    14·1 answer
  • Consider the following code segment, where num is an integer variable.int[][] arr = {{11, 13, 14 ,15},{12, 18, 17, 26},{13, 21,
    8·1 answer
  • A Development team begins work on a new software application and decides to involve the client’s IT experts to ensure that secur
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!