Assume a machine with an IP address of 144.24.67.22 impersonates a machine 192.169.60.0 using spoofing. Then, assume that the same machine sends an ICMP Echo Request to all of the machines on network 192.168.60.0/24 using the 192.168.60.255 broadcast address for the network. This will cause the ICMP Echo Reply messages from every computer on the 192.168.60.0/24 network to flood the sender 144.24.67.22. This is an example of what kind of attack? MITM Attack Smurf Attack SYN Flooding Attack ICMP Redirect Attack RPF Attack