What is the term 8 to describe an attack that falsifies a broadcast ICMP echo request and includes a primary and secondary victim?

What is the term 8 to describe an attack that falsifies a broadcast ICMP echo request and includes a primary and secondary victim?

What is the term 8 to describe an attack that falsifies a broadcast ICMP echo request and includes a primary and secondary victim?

A.
Fraggle Attack

B.
Man in the Middle Attack

C.
Trojan Horse Attack

D.
Smurf Attack

E.
Back Orifice Attack



Leave a Reply 2

Your email address will not be published. Required fields are marked *


seenagape

seenagape

I have the same idea.