How is the Smurf denial-of-service attack mounted?
a. By sending ICMP echo request to a broadcast address, and using the victim IP address as sender.
b. By opening a large number of TCP half-open connections.
c. By sending an echo packet that is larger than the maximum permissible size.
d. None of these.
.
Answers
Answered by
0
Answer:
B.
Explanation:
By sending ICMP echo request to a broadcast address, and using the victim IP address as sender.
The Smurf attack is a distributed denial-of-service attack.
Answered by
0
Answer: b. By opening a large number of TCP half-open connections.
Explanation:
- A smurf attack is a denial of service attack. In this the attacker attempts to flood the serves of the target with packets that are Internet Control Message Protocol.
- The attacker spoofed the IP address of the device to be targeted or one or more computer networks.
- The initial attack traffic rendering the network inaccessible.
- It can be mounted by opening a large number of TCP half-open connections.
- The opening of the TCP connections can cause a out of synchronization between the communicating hosts. This can crash out system at one or more sides due to network trafficking.
Learn more:
Define "attack" and "attackers" in computer security: https://brainly.in/question/8859587
Similar questions