Which best describes how a DNS amplification and reflection attack is implemented?

Which best describes how a DNS amplification and reflection attack is implemented?

Question:

Which best describes how a DNS amplification and reflection attack is implemented?

Options:

by predicting the next transaction ID used in DNS query and using that to construct a spoofed DNS message

by using multiple DNS open resolvers to send DNS response messages to the target device

by falsifying and spoofing RR information on the DNS resolver

by depleting DNS resolver’s CPU, memory, and/or socket buffers

Correct Answer

The Correct Answer for this Question is

by using multiple DNS open resolvers to send DNS response messages to the target device

Leave a Comment