372 views
0 votes
0 votes

The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP connections at the target host is: 

 

  1. Vulnerability attack
  2. Bandwidth flooding
  3. Connection flooding 
  4. UDP flooding 

Please log in or register to answer this question.

Related questions

0 votes
0 votes
0 answers
1
rsansiya111 asked Dec 6, 2021
416 views
IN DPSK technique, the technique used to encode bits is: AMIDifferential codeUnipolar RZ formatManchester format
1 votes
1 votes
2 answers
2
admin asked Apr 2, 2020
779 views
How many bits are required to encode all twenty six letters, ten symbols, and ten numerals?$5$$6$$7$$46$
0 votes
0 votes
2 answers
3
admin asked Mar 31, 2020
2,840 views
$PGP$ encrypts data by using a block cipher called :international data encryption algorithmprivate data encryption algorithminternet data encryption algorithmnone of the ...