exam questions

Exam 350-701 All Questions

View all questions & answers for the 350-701 exam

Exam 350-701 topic 1 question 10 discussion

Actual exam question from Cisco's 350-701
Question #: 10
Topic #: 1
[All 350-701 Questions]

Which two behavioral patterns characterize a ping of death attack? (Choose two.)

  • A. The attack is fragmented into groups of 16 octets before transmission.
  • B. The attack is fragmented into groups of 8 octets before transmission.
  • C. Short synchronized bursts of traffic are used to disrupt TCP connections.
  • D. Malformed packets are used to crash systems.
  • E. Publicly accessible DNS servers are typically used to execute the attack.
Show Suggested Answer Hide Answer
Suggested Answer: BD 🗳️
Reference:
https://en.wikipedia.org/wiki/Ping_of_death

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
aaInman
Highly Voted 3 years, 10 months ago
B and D is correct. If you google either or both B and D you'll land on a Wikipedia page that confirms the information: https://en.wikipedia.org/wiki/Ping_of_death#:~:text=Like%20other%20large%20but%20well,the%20injection%20of%20malicious%20code.
upvoted 8 times
...
sull3y
Highly Voted 2 years, 3 months ago
D. Malformed packets are used to crash systems. B. The attack is fragmented into groups of 8 octets before transmission. A Ping of death attack is a type of denial-of-service attack that sends malformed or oversized ping packets to a target network. The packets are typically fragmented into groups of 8 octets before transmission and when the target system reassembles the packets it can cause the system to crash or become unstable.
upvoted 6 times
...
Cock
Most Recent 6 months, 1 week ago
Selected Answer: BD
The typical fragmentation size related to this attack is around 8 octets.
upvoted 1 times
...
testingacc
7 months ago
B,D The "ping of death" is a network attack that sends oversized or malformed ICMP packets to crash or disrupt a target system. While it was more common in the past, most modern systems have defenses against it. This attack underscores the need for regular system updates and the use of firewalls to protect against malicious traffic.
upvoted 1 times
...
Marshpillowz
1 year, 1 month ago
Selected Answer: BD
Answers are B and D as per other responses
upvoted 1 times
...
c3qu1
1 year, 2 months ago
B and D is correct
upvoted 1 times
...
samtestking
1 year, 3 months ago
Why Choose only two?
upvoted 1 times
...
DarexTech100
1 year, 4 months ago
I'll th
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago