Question: Fill in the blank: 1 . In a _ _ _ _ _ Flood Attack, the attacker sends repeated SYN packets to every port on

Fill in the blank:
1. In a _____ Flood Attack, the attacker sends repeated SYN packets to every port on the targeted server, often using a spoofed IP address. The server, unaware of the attack, receives multiple, apparently legitimate requests to establish communication. It responds to each attempt with a SYN-ACK packet from each open port.
2. In a _____ Flood Attack, the server is constantly checking for an application to arrive and listening to the Internet port, when in fact there is no application being sent to the host.
3. In a _____ Flood Attack, the attacker overwhelms the server its targeting by pinging the sever numerous times without waiting for a response. This overloads the incoming bandwidth and causes the system to become extremely slow.
4. In a _____ Flood Attack, the attacker uses GET and POST requests to overload the resources of the server.
5. In a _____ Attack, the attacker uses the spoofed source IP address of the intended target, an attacker sends broadcast ICMP packets to numerous hosts in order to flood the victim with all the ICMP response packets.
6. In a _____ Attack, the attacker sends malformed ping requests that are larger than the number of bytes allowed by the IP protocol, crashing the system.
7. In a _____ Attack, the attacker uses UDP, Spoofing, and the MONLIST command to create a high bandwidth, high volume attack which will eventually overload the connection.
8. In a _____ Attack, attackers exploit a vulnerability in a device or software that is unknown to the developers and therefore no patch exists yet.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!