Jude, a pen tester working in Keiltech Ltd., performs sophisticated security testing on his company's network infrastructure to identify security loopholes. In this process, he started to circumvent the network protection tools and rewalls used in the company. He employed a technique that can create forged TCP sessions by carrying out multiple SYN, ACK, and first or FIN packets. Further, this process allowed Jude to execute DDoS attacks that can exhaust the network resources. What is the attack technique used by Jude for nding loopholes in the above scenario? A. Spoofed session ood attack B. UDP ood attack C. Peer-to-peer attack D. Ping-of-death attack Correct Answer: A This question is in 312-50v12 exam For getting CEH Certificate
Please login or Register to submit your answer