Jacob is looking through a traffic log that was captured using Wireshark. Jacob has come across
what appears to be SYN requests to an internal computer from a spoofed IP address. What is
Jacob seeing here?
A.
Jacob is seeing a Smurf attack.
B.
Jacob is seeing a SYN flood.
C.
He is seeing a SYN/ACK attack.
D.
He has found evidence of an ACK flood.