nerdexam
(ISC)2(ISC)2

CISSP · Question #790

CISSP Question #790: Real Exam Question with Answer & Explanation

The correct answer is D: specified source address.. A SYN flood attack is a type of denial-of-service attack that exploits the three-way handshake mechanism of the Transmission Control Protocol (TCP). The attacker sends a large number of TCP packets with the SYN flag set, indicating a request to establish a connection, to the targ

Submitted by hans_de· Mar 5, 2026Communication and Network Security

Question

If an attacker in a SYN flood attack uses someone else's valid host address as the source address, the system under attack will send a large number of Synchronize/Acknowledge (SYN/ACK) packets to the

Options

  • Adefault gateway.
  • Battacker's address.
  • Clocal interface being attacked.
  • Dspecified source address.

Explanation

A SYN flood attack is a type of denial-of-service attack that exploits the three-way handshake mechanism of the Transmission Control Protocol (TCP). The attacker sends a large number of TCP packets with the SYN flag set, indicating a request to establish a connection, to the target system, using a spoofed source address. The target system responds with a TCP packet with the SYN and ACK flags set, indicating an acknowledgment of the request, and waits for a final TCP packet with the ACK flag set, indicating the completion of the handshake, from the source address. However, since the source address is fake, the final ACK packet never arrives, and the target system keeps the connection half-open, consuming its resources and preventing legitimate connections. Therefore, the system under attack will send a large number of SYN/ACK packets to the specified source address, which is the spoofed address used by the attacker. The default gateway, the attacker's address, and the local interface being attacked are not the destinations of the SYN/ACK packets in a SYN flood attack.

Topics

#SYN flood#DoS attack#IP spoofing#TCP/IP

Community Discussion

No community discussion yet for this question.

Full CISSP PracticeBrowse All CISSP Questions