kailarich8216 kailarich8216 Today at 8:31 AM Computers and Technology Answered In a _______ attack, the attacker creates a series of dns requests containing the spoofed source address for the target system.