Which two techniques are used in a smurf attack? (Choose two.)
- session hijacking
- resource exhaustion
- botnets
- amplification
- reflection
Explanation: A smurf attack uses amplification and reflection techniques to overwhelm a targeted host. The threat actor forwards ICMP echo request messages that contain the source IP address of the victim to a large number of hosts. These hosts all reply to the spoofed IP address of the victim with the intent of overwhelming it.
Exam with this question: CyberOps Associate Final Exam Answers
Exam with this question: IoT Security 1.1 Chapter 4 Quiz Answers
Please login or Register to submit your answer