Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is the Three-way handshake? How can it be used to create a DOS attack?



What is the Three-way handshake? How can it be used to create a DOS attack?..

Answer / chaitanya

The three-way handshake is a cornerstone of the TCP suite: SYN, SYN/ACK, ACK. SYN is the outgoing connection request from client to server. ACK is the acknowledgement of the server back to the client, saying that yes I hear you, let’s open a connection. SYN/ACK is the final connection, and allows the two to speak. The problem is that this can be used as a very basic type of Denial of Service Attack. The client opens up the SYN connection, the server responds with the SYN/ACK, but then the client sends another SYN. The server treats this as a new connection request and keeps the previous connection open. As this is repeated over and over many times very quickly, the server quickly becomes saturated with a huge number of connection requests, eventually overloading its ability to connect to legitimate users.

Is This Answer Correct ?    3 Yes 1 No

Post New Answer

More Computer Security Interview Questions

Is a console a computer?

0 Answers  


What’s the difference between Symmetric and Asymmetric encryption?

1 Answers  


How would you login to Active Directory from a Linux or Mac box?

0 Answers  


What is data protection in transit vs data protection at rest?

1 Answers  


You are remoted in to a headless system in a remote area. You have no physical access to the hardware and you need to perform an OS installation. What do you do?

1 Answers  


What is the difference between a virus and a trojan?

0 Answers   Tavant Technologies, Zensar,


 How would you compromise an “Office Workstation” at a hotel?

1 Answers  


 What is your opinion on hacktivist groups such as Anonymous?

1 Answers  


 What is the difference between a Black Hat and a White Hat?

1 Answers  


Does indexing slow down computer?

0 Answers  


What is dora process in DHCP and how it works?

0 Answers  


 What is the difference between Information Protection and Information Assurance?

1 Answers  


Categories
  • Computer Security Interview Questions Computer Security (58)
  • Mobile Security Interview Questions Mobile Security (9)
  • Hacking Interview Questions Hacking (33)
  • Security AllOther Interview Questions Security AllOther (4)