Which of the following describes a smurf attack?
A.
Attack on a target using spoofed ICMP packets to flood it
B.
Intercepting traffic intended for a target and redirecting it to another
C.
Spoofed VLAN tags used to bypass authentication
D.
Forging tags to bypass QoS policies in order to steal bandwidth
Explanation: