How is the Smurf denial-of-service attack mounted?
a. By sending ICMP echo request to a broadcast address, and using the victim IP address as sender.
b. By opening a large number of TCP half-open connections.
c. By sending an echo packet that is larger than the maximum permissible size.
d. None of these.
Answers
Answered by
2
Answer:
A
Explanation:
Every host on target network generates a “ping reply” (ICMP Echo Reply) to victim.Ping reply stream can overload victim.
Answered by
1
Answer:
The correct answer is option a.
Explanation:
The Smurf denial-of-service attack is mounted by sending ICMP echo request to a broadcast address and using the victim IP address as the sender.
Smurf denial-of-service attack was named after DDOS.Smarf Malware. Smurf malware usually increase its potential of attack by exploiting the broadcast network's characteristics.
Similar questions