Which best describes how a DNS amplification and reflection attack is implemented?

Which best describes how a DNS amplification and reflection attack is implemented?
A. by predicting the next transaction ID used in DNS query and using that to construct a spoofed DNS message
B. by using multiple DNS open resolvers to send DNS response messages to the target device
C. by falsifying and spoofing RR information on the DNS resolver
D. by depleting DNS resolver’s CPU, memory, and/or socket buffers

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.