Which of the following describes a smurf attack?

Which of the following describes a smurf attack?

Which of the following describes a smurf attack?

A.
Attack on a target using spoofed ICMP packets to flood it

B.
Intercepting traffic intended for a target and redirecting it to another

C.
Spoofed VLAN tags used to bypass authentication

D.
Forging tags to bypass QoS policies in order to steal bandwidth



Leave a Reply 0

Your email address will not be published. Required fields are marked *