In a reflection attack, the source IP address in the attack packets is spoofed so that it contains the address of the victim.

(A) TRUE
(B) FALSE


Comments