Last Updated on November 19, 2023 by InfraExam
What best describes an amplification attack?
- A low volume of bad music is played progressively louder to the point that it becomes unbearable for people to listen to it.
- A small forged packet elicits a large reply from the reflectors.
- A small radio signal is initially weak and eventually increases the signal strength so that wireless devices will attach to it instead of the legitimate AP.
- There is no such attack that is called an amplification attack.
|Explanation & Hint:
An amplification attack in the context of network security is best described as:
A small forged packet elicits a large reply from the reflectors.
This type of attack is a form of a Distributed Denial of Service (DDoS) attack, where an attacker sends small queries to vulnerable servers that are configured to send much larger responses to the target of the attack. The difference in request size and response size is referred to as the amplification factor. The attacker spoofs the source IP address in the query packets to be the target’s address, so the server’s large responses flood the target, potentially overwhelming its network resources.