What is called an attach where the attacker spoofs the source IP address in an ICMP ECHO
broadcast packet so it seems to have originated at the victim’s system, in order to flood it with
REPLY packets?

A.
SYN flood attack
B.
Smurf attack
C.
Ping of Dead Attack
D.
Denial of Service (DOS) Attack
Explanation:
Reference: pg 158 Hansche: Official (ISC)2 Guide to the CISSP Exam