• Post author:
  • Post category:Updated
  • Reading time:2 mins read
  • Post last modified:June 12, 2024

Which two techniques are used in a smurf attack? (Choose two.)

  • session hijacking
  • reflection
  • amplification
  • botnets
  • resource exhaustion
Explanation & Hint:

In a Smurf attack, two primary techniques are used:

  1. Amplification: This technique involves increasing the volume of the attack traffic. In the context of a Smurf attack, a small query is sent to a network broadcast address, causing every device on that network to respond to the request. This multiplies the amount of traffic sent to the victim, effectively amplifying the attack.
  2. Reflection: This is where the attacker spoofs the source IP address of their packets to be the IP address of the victim. When the network responds to the broadcast request, it sends its response to the victim’s IP address instead of back to the attacker. This not only hides the identity of the attacker but also directs the response traffic to the victim, causing a denial of service.

The other options listed, such as session hijacking, botnets, and resource exhaustion, are not specific techniques used in a Smurf attack, although botnets might be used to carry out such an attack and resource exhaustion is a consequence of it.

For more Questions and Answers:

CyberOps Associate 1.0 & CA 1.02 Final Exam Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments