What is the term used to describe an attack that falsifies a broadcast ICMP echo request and includes a primary and secondary victim?
A.
Fraggle Attack
B.
Man in the Middle Attack
C.
Trojan Horse Attack
D.
Smurf Attack
What is the term used to describe an attack that falsifies a broadcast ICMP echo request and includes a primary and secondary victim?
What is the term used to describe an attack that falsifies a broadcast ICMP echo request and includes a primary and secondary victim?
A.
Fraggle Attack
B.
Man in the Middle Attack
C.
Trojan Horse Attack
D.
Smurf Attack