SEARCH
You are in browse mode. You must login to use MEMORY

   Log in to start


From course:

Sigurnost računalnih mreža 2

» Start this Course
(Practice similar questions for free)
Question:

SYN flooding?

Author: Elizabeta Miličević



Answer:

Napad koji zloupotrebljava mehanizam uspostave TCP konekcije, onesposobljava odredišni sustav uspostavom velikog broja “poluotvorenih” konekcija


0 / 5  (0 ratings)

1 answer(s) in total