If an attacker in a SYN flood attack uses someone else’s valid host address as the source address, the
system under attack will send a large number of Synchronize/Acknowledge (SYN/ACK) packets to the

A.
default gateway.
B.
attacker’s address.
C.
local interface being attacked.
D.
specified source address.