A Smurf attack relies on what form of traffic to flood a victim?
A. User datagram protocol (UDP)
B. Transmission control protocol (TCP) SYN packets
C. Internet control message protocol (ICMP) Type 0
D. Encrypted
Related Courses
Security+ Certification Boot Camp (SYO-301)
Security+ Prep Course (SYO-301)
CompTIA Advanced Security Practitioner (CASP) Prep Course
Security+ Question of the Week Series
- Security+ Exam Prep Question of the Week
- Security+ Exam Prep Question of the Week
- Security+ Question of the Week
- Security+ Question of the Week
- Security+ Question of the Week
- Security+ Question of the Week
- Security+ Question of the Week
- Security+ Question of the Week
- Security+ Question of the Week
- Security+ Question of the Week
- Security+ Question of the Week
- Security+ Question of the Week
- Security+ Question of the Week
- Security+ Question of the Week
- Security+ Question of the Week
- Security+ Question of the Week
- Security+ Question of the Week
- Security+ Question of the Week
- Security+ Question of the Week
- Security+ Question of the Week
- Security+ Question of the Week
- Security+ Question of the Week
Please support our Sponsors here :