Which of the following is unlike the other three?
A.
El Gamal
B.
Teardrop
C.
Buffer Overflow
D.
Smurf
Explanation:
Options B, C and D are all Denial of Service attacks. El Gamal is the Diffie-Hellman
key exchange algorithm and is usually described as an active exchange of keys by two parties.
The buffer overflow attack objective is consume the available memory for the TCP/IP protocol
stack to make the machine crash. Teardrop and Smurf are DoS attacks that make use of spoofing.