Which of the following describes a smurf attack? using an IP Broadcast address. number of machines on the network that receive and respond to these packets is very large, the victim’s computer will be flooded with traffic. This can slow down the victim’s computer to the point where it becomes impossible to work on.
A.
Attack on a target using spoofed ICMP packets to flood it
B.
Intercepting traffic intended for a target and redirecting it to another
C.
Spoofed VLAN tags used to bypass authentication
D.
Forging tags to bypass QoS policies in order to steal bandwidth
Explanation:
The Smurf Attack is a distributed denial-of-service attack in which large numbers of Internet Control Message
Protocol (ICMP) packets with the intended victim’s spoofed source IP are broadcast to a computer network
Most devices on a network will, by default, respond to this by sending a reply to the source IP address. If the