Two hosts have established a TCP connection and are exchanging data. A threat actor sends a TCP segment with the RST bit set to both hosts informing them to immediately stop using the TCP connection. Which attack is this?
- TCP reset attack
- UDP flood attack
- TCP SYN Flood attack
- DoS attack
- TCP session hijacking
Explanation: A TCP reset attack can be used to terminate TCP communications between two hosts using a pair of FIN and ACK segments from each endpoint.
Exam with this question: 3.7.6 Check Your Understanding - TCP and UDP Vulnerabilities
Exam with this question: 16.3.6 Check Your Understanding - TCP and UDP Vulnerabilities
Please login or Register to submit your answer