From the list below, choose the exploit that can be considered a DoS attack because more traffic
than what the node can handle is flooded to that node.
A.
Ping of death
B.
Logic bomb
C.
Buffer overflow
D.
Smurf attack
Explanation:
Buffer overflows occur when an application receives more data than it is programmed to accept.
This situation can cause an application to terminate. The termination may leave the system
sending the data with temporary access to privileged levels in the attacked system.
Reference:
Mike Pastore and Emmett Dulaney , Security+ Study Guide , 2nd Edition, Alameda , Sybex , 2004,
p 135