|
INTERVIEW QUESTIONS
MAIL MANAGEMENT SOFTWARE
MAILPROTECTOR
DETAILS
Question: What is the Three-way handshake? How can it be used to create a DOS attack?
Answer: ACK is the acknowledgement of the server back to the client, saying that yes I hear you, let’s open a connection. SYN/ACK is the final connection, and allows the two to speak. The problem is that this can be used as a very basic type of Denial of Service Attack. The client opens up the SYN connection, the server responds with the SYN/ACK, but then the client sends another SYN. The server treats this as a new connection request and keeps the previous connection open. As this is repeated over and over many times very quickly, the server quickly becomes saturated with a huge number of connection requests, eventually overloading its ability to connect to legitimate users.
|
|
|
Category |
Mailprotector Interview Questions & Answers -
Exam Mode /
Learning Mode
|
Rating |
(0.2) By 9505 users |
Added on |
8/8/2016 |
Views |
66314 |
Rate it! |
|
|
Question:
What is the Three-way handshake? How can it be used to create a DOS attack?
Answer:
ACK is the acknowledgement of the server back to the client, saying that yes I hear you, let’s open a connection. SYN/ACK is the final connection, and allows the two to speak. The problem is that this can be used as a very basic type of Denial of Service Attack. The client opens up the SYN connection, the server responds with the SYN/ACK, but then the client sends another SYN. The server treats this as a new connection request and keeps the previous connection open. As this is repeated over and over many times very quickly, the server quickly becomes saturated with a huge number of connection requests, eventually overloading its ability to connect to legitimate users. Source: CoolInterview.com
If you have the better answer, then send it to us. We will display your answer after the approval.
Rules to Post Answers in CoolInterview.com:-
- There should not be any Spelling Mistakes.
- There should not be any Gramatical Errors.
- Answers must not contain any bad words.
- Answers should not be the repeat of same answer, already approved.
- Answer should be complete in itself.
|
|
Related Questions |
View Answer |
|
What is the difference between closed-source and open-source? Which is better?
|
View Answer
|
|
How would you lock down a mobile device?
|
View Answer
|
|
What is the difference between Information Protection and Information Assurance?
|
View Answer
|
|
What's the difference between a White Box test and a Black Box test?
|
View Answer
|
|
What's better, a red team or a blue team, in penetration testing scenarios?
|
View Answer
|
|
What is worse in Firewall Detection, a false negative or a false positive?
|
View Answer
|
|
What is the difference between a Vulnerability and an Exploit?
|
View Answer
|
|
What is the difference between an HIDS (Host Intrusion Detection System) and a NIDS (Network Intrusion Detection System)?
|
View Answer
|
|
What is the CIA triangle?
|
View Answer
|
|
why is it easier to break into a Windows local account than an AD account?
|
View Answer
|
|
What is an easy way to configure a network to allow only a single computer to login on a particular jack?
|
View Answer
|
|
How do you protect your home Wireless Access Point?
|
View Answer
|
|
What is data protection in transit vs data protection at rest?
|
View Answer
|
|
How to judge if a remote server is running IIS or Apache?
|
View Answer
|
|
What are the three ways to authenticate a person?
|
View Answer
|
|
What do you think of social networking sites such as Facebook and LinkedIn in the context of data Security?
|
View Answer
|
|
How to reset a password-protected BIOS configuration?
|
View Answer
|
|
What is the difference between a Black Hat and a White Hat?
|
View Answer
|
|
How would you find out what a POST code means?
|
View Answer
|
|
What is SSL and why is it not enough when it comes to encryption?
|
View Answer
|
Please Note: We keep on updating better answers to this site. In case you are looking for Jobs, Pls Click Here Vyoms.com - Best Freshers & Experienced Jobs Website.
View All Mailprotector Interview Questions & Answers - Exam Mode /
Learning Mode
|