In a reflection attack, the source IP address in the attack packets is spoofed so that it contains the address of the victim.
(A) TRUE
(B) FALSE
(A) TRUE
(B) FALSE
Reflection attacks make use of a potentially legitimate third party component to send the attack traffic to a victim, ultimately hiding the attackers’ own identity. The victim will end up receiving a large volume of response packets it never had requested. With a large enough attack, the victim may end up with a congested network.
Comments
Post a Comment