A small amount of spoofed packets are being sent across a network and a large amount of
reply packets are being sent back to the network resource. Which of the following BEST
describes this security threat?

A.
Worm
B.
Smurf
C.
Logic Bomb
D.
Man-in-the-middle