What is called an attach where the attacker spoofs the source IP address in an ICMP ECHO broadcast packet…?

What is called an attach where the attacker spoofs the source IP address in an ICMP ECHO broadcast
packet so it seems to have originated at the victim’s system, in order to flood it with REPLY packets?

What is called an attach where the attacker spoofs the source IP address in an ICMP ECHO broadcast
packet so it seems to have originated at the victim’s system, in order to flood it with REPLY packets?

A.
SYN flood attack

B.
Smurf attack

C.
Ping of Dead Attack

D.
Denial of Service (DOS) Attack

Explanation:
pg 158
Hansche: Official
(ISC)2 Guide to the
CISSP Exam



Leave a Reply 0

Your email address will not be published. Required fields are marked *

three × two =