PdfPrep.com

Which best describes how a DNS amplification and reflection attack is implemented?

Which best describes how a DNS amplification and reflection attack is implemented?
A . by predicting the next transaction ID used in DNS query and using that to construct a spoofed DNS message
B . by using multiple DNS open resolvers to send DNS response messages to the target device
C . by falsifying and spoofing RR information on the DNS resolver
D . by depleting DNS resolver’s CPU, memory, and/or socket buffers

Answer: B

Exit mobile version