The ultimate target of a smurf attack should:
A.
Contact the reflectors, either to ask them to reconfigure their networks to shut down the attack, or to ask for their assistance in tracing the stimulus stream.
B.
Launch a retaliatory attack on the reflector network.
C.
Ask the reflector network administrator to quench the attack by allowing directed broadcasts.
D.
Use the access-list logging command on the inside interface of the router of the ultimate target network todetermine the station inside the network launching the attack.