ISC Exam Questions

What is called an attach where the attacker spoofs the source IP address in an ICMP ECHO broadcast p

What is called an attach where the attacker spoofs the source IP address in an ICMP ECHO broadcast
packet so it seems to have originated at the victim’s system, in order to flood it with REPLY packets?

A.
SYN flood attack

B.
Smurf attack

C.
Ping of Dead Attack

D.
Denial of Service (DOS) Attack

Explanation:
pg 158
Hansche: Official
(ISC)2 Guide to the
CISSP Exam