A TCP SYN Attack:

A.
requires a synchronized effort by multiple attackers
B.
takes advantage of the way a TCP session is established
C.
may result in elevation of privileges.
D.
is not something system users would notice
Explanation:
“[SYN Flood] Attackers can take advantage of this design flaw by continually
sending the victim SYN messages with spoofed packets. The victim will commit the necessary
resources to setup this communication socket, and it will send its SYN/ACK message waiting for
the ACK message in return. However, the victim will never receive the ACK message, because the
packet is spoofed, and victim system sent the SYN/ACK message to a computer that does not
exist. So the victim system receives a SYN message, add it dutifully commits the necessary
resources to setup a connection with another computer. This connection is queued waiting for the
ACK message, and the attacker sends another SYN message. The victim system does what is
supposed to can commits more resources, sends the SYN/ACK message, and queues this
connection. This may only need to happen a dozen times before the victim system no longer has
the necessary resources to open up another connection. This makes the victim computer
unreachable from legitimate computers, denying other systems service from the victim computer.”
Pg. 735 Shon Harris CISSP All-In-One Exam Guide