Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Alibaba Exam ACA-Sec1 Topic 5 Question 93 Discussion

Actual exam question for Alibaba's ACA-Sec1 exam
Question #: 93
Topic #: 5
[All ACA-Sec1 Questions]

What design flaw of TCP/IP protocol does SYN flood attack use?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Soledad
2 days ago
That's correct. The attacker floods the server with SYN requests, causing it to run out of resources and become unresponsive.
upvoted 0 times
...
Hildegarde
6 days ago
The SYN flood attack exploits the TCP 3-way handshake, which is the correct answer. I'm not falling for those other distractors!
upvoted 0 times
...
Essie
6 days ago
I think the SYN flood attack uses the TCP 3 times hands shake design flaw.
upvoted 0 times
...
Venita
8 days ago
C) TCP 3 times hands shake
upvoted 0 times
...

Save Cancel