Which of the following describes a smurf attack?

A. Attack on a target using spoofed ICMP packets to flood it
B. Intercepting traffic intended for a target and redirecting it to another
C. Spoofed VLAN tags used to bypass authentication
D. Forging tags to bypass QoS policies in order to steal bandwidth

Answer: A. Attack on a target using spoofed ICMP packets to flood it

Computer Science & Information Technology

You might also like to view...

When creating labels, the number of cells in the table template is determined by the:

A) application that is selected. B) user. C) Word. D) product number that is selected.

Computer Science & Information Technology

What type of tool can you use to update time-sensitive content automatically, such as a calendar or the weather?

A. FTP clients B. dashboards C. widgets D. a VPS

Computer Science & Information Technology