Which attack is being used when threat actors initiate a simultaneous, coordinated attack from multiple source machines?
- Address Spoofing Attack
- Amplification and Reflection Attacks
- ICMP Attack
- MiTM Attack
- Session Hijacking
Explanation: In an amplification attack, the threat actor forwards ICMP echo request messages to many hosts. These messages contain the source IP address of the victim. All of these hosts then reply to the spoofed IP address of the victim to overwhelm it, creating a reflection attack.
Exam with this question: 3.6.7 Check Your Understanding - IP Vulnerabilities and Threats
Exam with this question: 16.2.6 Check Your Understanding - IP Vulnerabilities and Threats
Please login or Register to submit your answer