How is a smurf attack conducted?
- by sending a large number of packets to overflow the allocated buffer memory of the target device
- by sending a large number of ICMP requests to directed broadcast addresses from a spoofed source address on the same network
- by sending a large number of TCP SYN packets to a target device from a spoofed source address
- by sending an echo request in an IP packet larger than the maximum packet size of 65,535 bytes
Exam with this question: CCNA Security Chapter 1 Exam Answers
Exam with this question: CCNA Security Chapter 1 Exam (CCNAS v1.2)
Please login or Register to submit your answer