___________ is an attack technique where numerous SYN packets are spoofed with a bogus source address which is then sent to an inundated server.
(a) SYN flooding attack
(b) ACK flooding attack
(c) SYN & ACK flooding attack
(d) Packet flooding attack
I have been asked this question in class test.
The origin of the question is Network Models topic in chapter Understanding Network Models for Security of Cyber Security