Which of the following describes a smurf attack?
A. Attack on a target using spoofed ICMP packets to flood it
B. Intercepting traffic intended for a target and redirecting it to another
C. Spoofed VLAN tags used to bypass authentication
D. Forging tags to bypass QoS policies in order to steal bandwidth
Answer: A. Attack on a target using spoofed ICMP packets to flood it
Computer Science & Information Technology
You might also like to view...
When creating labels, the number of cells in the table template is determined by the:
A) application that is selected. B) user. C) Word. D) product number that is selected.
Computer Science & Information Technology
What type of tool can you use to update time-sensitive content automatically, such as a calendar or the weather?
A. FTP clients B. dashboards C. widgets D. a VPS
Computer Science & Information Technology