medium
Single Answer
0

Erica wants to conduct an amplified DDoS attack against a system. What key step is required as part of her attack?

Answer Options

A

Reversing the target's IP address

B

Spoofing the target's IP address

C

Conducting an on-path attack to send traffic to the target

D

Spoofing responses from the amplification system to the target

Correct Answer: B

Explanation

Amplification attacks typically use spoofed User Datagram Protocol (UDP) queries sent to servers to increase the volume of traffic sent in response to the target. Erica's process might involve identifying large DNS responses she can get with a small query, then spoofing a target system's IP address in the packets she sends to DNS servers. They would then respond with the large responses, amplifying her requests and creating a distributed denial-of-service attack by using many servers to amplify her traffic. This doesn't require reversing an IP address, conducting an on-path attack, or spoofing the responses from the servers.