Computer Science, asked by Ash1shSharma, 11 months ago

How is the Smurf denial-of-service attack mounted?

a. By sending ICMP echo request to a broadcast address, and using the victim IP address as sender.

b. By opening a large number of TCP half-open connections.

c. By sending an echo packet that is larger than the maximum permissible size.

d. None of these.

Answers

Answered by SailajanandaBanerjee
2

Answer:

A

Explanation:

Every host on target network generates a “ping reply” (ICMP Echo Reply) to victim.Ping reply stream can overload victim.

Answered by bestanswers
1

Answer:

The correct answer is option a.

Explanation:

The Smurf denial-of-service attack is mounted by sending ICMP echo request to a broadcast address and using the victim IP address as the sender.

Smurf denial-of-service attack was named after DDOS.Smarf Malware. Smurf malware usually increase its potential of attack by exploiting the broadcast network's characteristics.

Similar questions