Which best describes how a DNS amplification and reflection attack is implemented?

Posted by: Pdfprep Category: 210-250 Tags: , ,

Which best describes how a DNS amplification and reflection attack is implemented?
A . by predicting the next transaction ID used in DNS query and using that to construct a spoofed DNS message
B . by using multiple DNS open resolvers to send DNS response messages to the target device
C . by falsifying and spoofing RR information on the DNS resolver
D . by depleting DNS resolver’s CPU, memory, and/or socket buffers

Answer: B

Leave a Reply

Your email address will not be published.