Watch this video on YouTube
Which of the following attacks involves an attacker sending large amounts of ICMP Echo (ping) traffic to a broadcast address, all of it having a spoofed source address?