exam questions

Exam 350-701 All Questions

View all questions & answers for the 350-701 exam

Exam 350-701 topic 1 question 10 discussion

Actual exam question from Cisco's 350-701
Question #: 10
Topic #: 1
[All 350-701 Questions]

Which two behavioral patterns characterize a ping of death attack? (Choose two.)

  • A. The attack is fragmented into groups of 16 octets before transmission.
  • B. The attack is fragmented into groups of 8 octets before transmission.
  • C. Short synchronized bursts of traffic are used to disrupt TCP connections.
  • D. Malformed packets are used to crash systems.
  • E. Publicly accessible DNS servers are typically used to execute the attack.
Show Suggested Answer Hide Answer
Suggested Answer: BD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
aaInman
Highly Voted 4 years, 1 month ago
B and D is correct. If you google either or both B and D you'll land on a Wikipedia page that confirms the information: https://en.wikipedia.org/wiki/Ping_of_death#:~:text=Like%20other%20large%20but%20well,the%20injection%20of%20malicious%20code.
upvoted 8 times
...
sull3y
Highly Voted 2 years, 6 months ago
D. Malformed packets are used to crash systems. B. The attack is fragmented into groups of 8 octets before transmission. A Ping of death attack is a type of denial-of-service attack that sends malformed or oversized ping packets to a target network. The packets are typically fragmented into groups of 8 octets before transmission and when the target system reassembles the packets it can cause the system to crash or become unstable.
upvoted 6 times
...
MerlinTheWizard
Most Recent 2 weeks, 1 day ago
Selected Answer: BD
Answers are not entirely correct. The packets are not malformed - they have a valid header and valid data (8-octet long). The problem would be reassembly at the target machine - which has a vulnerability in the protocol/system/etc., but the packets themselves, despite being fragmented, are entirely valid.
upvoted 1 times
...
CyberGhost666
1 month, 3 weeks ago
Selected Answer: BD
These fragments are typically broken into 8-octet (8-byte) segments — because IP fragmentation offsets are measured in 8-byte units And malformed packets are used on these attacks.
upvoted 1 times
...
Cock
9 months, 2 weeks ago
Selected Answer: BD
The typical fragmentation size related to this attack is around 8 octets.
upvoted 1 times
...
testingacc
10 months, 1 week ago
B,D The "ping of death" is a network attack that sends oversized or malformed ICMP packets to crash or disrupt a target system. While it was more common in the past, most modern systems have defenses against it. This attack underscores the need for regular system updates and the use of firewalls to protect against malicious traffic.
upvoted 1 times
...
Marshpillowz
1 year, 4 months ago
Selected Answer: BD
Answers are B and D as per other responses
upvoted 1 times
...
c3qu1
1 year, 5 months ago
B and D is correct
upvoted 1 times
...
samtestking
1 year, 6 months ago
Why Choose only two?
upvoted 1 times
...
DarexTech100
1 year, 7 months ago
I'll th
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...