Posted by: Pdfprep
Post Date: November 5, 2020
Which best describes how a DNS amplification and reflection attack is implemented?
A . by predicting the next transaction ID used in DNS query and using that to construct a spoofed DNS message
B . by using multiple DNS open resolvers to send DNS response messages to the target device
C . by falsifying and spoofing RR information on the DNS resolver
D . by depleting DNS resolver’s CPU, memory, and/or socket buffers
Answer: B
Leave a Reply