ExamGecko
Question list
Search
Search

Related questions











Question 495 - 312-50v12 discussion

Report
Export

Jude, a pen tester working in Keiltech Ltd., performs sophisticated security testing on his company's network infrastructure to identify security loopholes. In this process, he started to circumvent the network protection tools and firewalls used in the company. He employed a technique that can create forged TCP sessions by carrying out multiple SYN, ACK, and RST or FIN packets. Further, this process allowed Jude to execute DDoS attacks that can exhaust the network resources. What is the attack technique used by Jude for finding loopholes in the above scenario?

A.
UDP flood attack
Answers
A.
UDP flood attack
B.
Ping-of-death attack
Answers
B.
Ping-of-death attack
C.
Spoofed session flood attack
Answers
C.
Spoofed session flood attack
D.
Peer-to-peer attack
Answers
D.
Peer-to-peer attack
Suggested answer: C

Explanation:

In order to circumvent network protection tools, cybercriminals may forge a TCP session more efficiently by submitting a bogus SYN packet, a series of ACK packets, and at least one RST (reset) or FIN (connection termination) packet. This tactic allows crooks to get around defenses that only keep tabs on incoming traffic rather than analyzing return traffic.

asked 18/09/2024
Robert Endicott
45 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first