List of questions
Related questions
Question 50 - 212-82 discussion
An attacker with malicious intent used SYN flooding technique to disrupt the network and gain advantage over the network to bypass the Firewall. You are working with a security architect to design security standards and plan for your organization. The network traffic was captured by the
SOC team and was provided to you to perform a detailed analysis. Study the Synflood.pcapng file and determine the source IP address.
Note: Synflood.pcapng file is present in the Documents folder of Attacker-1 machine.
A.
20.20.10.180
B.
20.20.10.19
C.
20.20.10.60
D.
20.20.10.59
Your answer:
0 comments
Sorted by
Leave a comment first