What type of attack occurs when the attacker spoofs the IP address of the victim, sending a continuous stream of small requests, which produce a continuous stream of much larger replies that are to be sent to the victim’s IP address?
A. reflection attack
B. amplification attack
C. MITM attack
D. Trojan virus