Computer Science, asked by dj197, 1 year ago

How is the Smurf denial-of-service attack mounted?

 a. By sending ICMP echo request to a broadcast address, and using the victim IP address as sender.

 b. By opening a large number of TCP half-open connections.

 c. By sending an echo packet that is larger than the maximum permissible size.

 d. None of these.

.​

Answers

Answered by jefferson7
0

Answer:

B.

Explanation:

By sending ICMP echo request to a broadcast address, and using the victim IP address as sender.

The Smurf attack is a distributed denial-of-service attack.

Answered by Surnia
0

Answer: b. By opening a large number of TCP half-open connections.

Explanation:

  • A smurf attack is a denial of service attack. In this the attacker attempts to flood the serves of the target with packets that are Internet Control Message Protocol.
  • The attacker spoofed the IP address of the device to be targeted or one or more computer networks.
  • The initial attack traffic rendering the network inaccessible.
  • It can be mounted by opening a large number of TCP half-open connections.
  • The opening of the TCP connections can cause a out of synchronization between the communicating hosts. This can crash out system at one or more sides due to network trafficking.

Learn more:

Define "attack" and "attackers" in computer security: https://brainly.in/question/8859587

Similar questions