Which of the following is unlike the other three?

A.
El Gamal
B.
Teardrop
C.
Buffer Overflow
D.
Smurf
Explanation:
Options B, C and D are all Denial of Service attacks. El Gamal is the Diffie-Hellman key exchange
algorithm and is usually described as an active exchange of keys by two parties. The buffer overflowattack objective is consume the available memory for the TCP/IP protocol stack to make the machine
crash. Teardrop and Smurf are DoS attacks that make use of spoofing.