An attack that changes the source IP address of a ICMP ECHO request packet so it appears…

An attack that changes the source IP address of a ICMP ECHO request packet so itappears as though it came from the victim and is broadcasted to an amplifyingnetwork can be called all of the following except:

An attack that changes the source IP address of a ICMP ECHO request packet so it appears as though it came from the victim and is broadcasted to an amplifying network can be called all of the following except:

A.
Smurf

B.
ICMP storm

C.
DoS

D.
Tunneling

Explanation:
Tunneling is an attack that utilizes low-level functionality to infiltrate a system.smurf attack is a denial-of-service attack. The attacker changes an ICMP ECHO request packet’s source IP address to that of the victim. The attacker thenbroadcasts the ICMP packets to an amplifying network. Each computer will respond andsend an ICMP ECHO reply to the victim. The goal is to overwhelm the victim.



Leave a Reply 4

Your email address will not be published. Required fields are marked *


Sam

Sam

Is the explanation saying this is a Smurf attack, because it sounds a lot like a Smurf attack.

Don

Don

Ans D – the attack is a combination of ABC ‘except’ D.

Adeshina Adebayo Bright

Adeshina Adebayo Bright

thank you Don simple english. Ans is D

Pakaj

Pakaj

Answers is A according to me