Which statement is true about a Smurf attack?
A.
It sends ping requests in segments of an invalid size.
B.
It intercepts the third step in a TCP three-way handshake to hijack a session.
C.
It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a
target system.
D.
It uses Trojan horse applications to create a distributed collection of “zombie” computers, which
can be used to launch a coordinatedDDoS attack.