Which two techniques are used in a smurf attack? (Choose two.)

IT Questions BankCategory: CCNA CyberOpsWhich two techniques are used in a smurf attack? (Choose two.)

Which two techniques are used in a smurf attack? (Choose two.)

  • session hijacking
  • resource exhaustion
  • botnets
  • amplification
  • reflection

Explanation: A smurf attack uses amplification and reflection techniques to overwhelm a targeted host. The threat actor forwards ICMP echo request messages that contain the source IP address of the victim to a large number of hosts. These hosts all reply to the spoofed IP address of the victim with the intent of overwhelming it.

More Questions: CyberOps Associate Final Exam Answers
More Questions: IoT Security 1.1 Chapter 4 Quiz Answers


guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x