Which two techniques are used in a smurf attack? (Choose two.)

IT Questions BankCategory: CCNA CyberOpsWhich two techniques are used in a smurf attack? (Choose two.)

Which two techniques are used in a smurf attack? (Choose two.)

  • session hijacking
  • resource exhaustion
  • botnets
  • amplification
  • reflection

Explanation: A smurf attack uses amplification and reflection techniques to overwhelm a targeted host. The threat actor forwards ICMP echo request messages that contain the source IP address of the victim to a large number of hosts. These hosts all reply to the spoofed IP address of the victim with the intent of overwhelming it.

Exam with this question: CyberOps Associate Final Exam Answers
Exam with this question: IoT Security 1.1 Chapter 4 Quiz Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x