Which statement is true about a Smurf attack?

Which statement is true about a Smurf attack?

Which statement is true about a Smurf attack?

A.
It sends ping requests in segments of an invalid size.

B.
It intercepts the third step in a TCP three-way handshake to hijack a session.

C.
It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a
target system.

D.
It uses Trojan horse applications to create a distributed collection of “zombie” computers, which
can be used to launch a coordinatedDDoS attack.



Leave a Reply 0

Your email address will not be published. Required fields are marked *