An attack that changes the source IP address of a ICMP ECHO request packet so it appears as though it came from the victim and is broadcasted to an amplifying network can be called all of the following except:

A.
Smurf
B.
ICMP storm
C.
DoS
D.
Tunneling
Explanation:
Tunneling is an attack that utilizes low-level functionality to infiltrate a system.smurf attack is a denial-of-service attack. The attacker changes an ICMP ECHO request packet’s source IP address to that of the victim. The attacker thenbroadcasts the ICMP packets to an amplifying network. Each computer will respond andsend an ICMP ECHO reply to the victim. The goal is to overwhelm the victim.
Is the explanation saying this is a Smurf attack, because it sounds a lot like a Smurf attack.
0
0
Ans D – the attack is a combination of ABC ‘except’ D.
0
0
thank you Don simple english. Ans is D
0
0
Answers is A according to me
0
0