(The following depiction of a Smurf attack is false? (Single choice) A. The attacker's final solution is to obtain an account on the solution computer B. It uses ICMP packets to attack C. It relies on a large number of vulnerable networks as an amplifier D. It is a denial of service way of attack)