Which type of attack will make use of misconfigured third party systems to perpetrate a DoS?

A.
Smurf
B.
Session hijacking
C.
Teardrop
D.
Land
Explanation:
Answer A is correct; smurf attacks are a DoS attack that use spoofed ICMP Echo Requests sent to misconfigured third parties (amplifiers) to attempt to exhaust the resources of the victim.Incorrect Answers and Explanations: B, C, and D: Answers B, C, and D are incorrect. Session hijacking involves a combination of sniffing and spoofing in order for the attacker to masquerade as one or both ends of an established connection. The teardrop attack is a DoS that works by sending overlapping fragments that, when received by a vulnerable host, can cause a system to crash. The land attack is a malformed packet DoS that can cause vulnerable systems to crash by sending a SYN packet with both the source and destination IP address set to that of the victim.
check
0
0
smurf attacks are a DoS attack that use spoofed ICMP Echo Requests sent to misconfigured third parties (amplifiers) to attempt to exhaust the resources of the victim.
The teardrop attack is a DoS that works by sending overlapping fragments
Session hijacking involves a combination of sniffing and spoofing in order for the attacker to masquerade as one or both ends of an established connection.
The land attack is a malformed packet DoS that can cause vulnerable systems to crash by sending a SYN packet with both the source and destination IP address set to that of the victim
0
0