How is a smurf attack conducted?

IT Questions BankCategory: CCNA SecurityHow is a smurf attack conducted?

How is a smurf attack conducted?

  • by sending a large number of packets to overflow the allocated buffer memory of the target device
  • by sending a large number of ICMP requests to directed broadcast addresses from a spoofed source address on the same network
  • by sending a large number of TCP SYN packets to a target device from a spoofed source address
  • by sending an echo request in an IP packet larger than the maximum packet size of 65,535 bytes

Exam with this question: CCNA Security Chapter 1 Exam Answers
Exam with this question: CCNA Security Chapter 1 Exam (CCNAS v1.2)

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x