Which of the following describes a smurf attack?
A. Attack on a target using spoofed ICMP packets to flood it
B. Intercepting traffic intended for a target and redirecting it to another
C. Spoofed VLAN tags used to bypass authentication
D. Forging tags to bypass QoS policies in order to steal bandwidth