Which best describes how a DNS amplification and reflection attack is implemented?
A. by predicting the next transaction ID used in DNS query and using that to construct a spoofed DNS message
B. by using multiple DNS open resolvers to send DNS response messages to the target device
C. by falsifying and spoofing RR information on the DNS resolver
D. by depleting DNS resolver’s CPU, memory, and/or socket buffers