Steven, a security analyst for XYZ associates, is analyzing packets captured by Ethereal on a Linux server inside his network when the server starts to slow down tremendously. Steven examines the following Ethereal capture:
A.
SYN flood
B.
ARP spoofing
C.
Smurf attack
D.
Ping of Death
Explanation:
A perpetrator is sending a large amount of ICMP echo (ping) traffic to IP broadcast addresses, all of it having a spoofed source address of the intended victim. If the routing device delivering traffic to those broadcast addresses performs the IP broadcast to layer 2 broadcast function, most hosts on that IP network will take the ICMP echo request and reply to it with an echo reply, multiplying the traffic by the number of hosts responding.
I have recently started a blog, the info you provide on this web site has helped me tremendously. Thanks for all of your time & work.
http://www.bastcilkdoptb.com/