Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam 312-49v10 topic 1 question 60 discussion

Actual exam question from ECCouncil's 312-49v10
Question #: 60
Topic #: 1
[All 312-49v10 Questions]

What header field in the TCP/IP protocol stack involves the hacker exploit known as the Ping of Death?

  • A. ICMP header field
  • B. TCP header field
  • C. IP header field
  • D. UDP header field
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
ctaregistro
Highly Voted 2 years, 4 months ago
A. ICMP header field
upvoted 8 times
...
torabi123
Most Recent 5 months, 3 weeks ago
The "Ping of Death" is a well-known hacker exploit that involves the Internet Control Message Protocol (ICMP), which is not part of the TCP/IP header but is a separate protocol that operates alongside the TCP/IP stack. In the Ping of Death attack, a hacker sends an oversized or malformed ICMP Echo Request packet (ping) to a target host. The oversized packet can cause buffer overflows or other vulnerabilities in the target's network stack, leading to system instability, crashes, or even potential security breaches. The ICMP Echo Request and Echo Reply messages are commonly used for network troubleshooting, such as the "ping" command that checks the reachability of a host on an IP network. However, when an oversized or specially crafted ICMP Echo Request is sent as part of a Ping of Death attack, it can exploit vulnerabilities in the target system's handling of ICMP packets. --> ICMP header field
upvoted 2 times
...
deshrika
7 months ago
The question is in referrence to the following. In 2013, an IPv6 version of the ping of death vulnerability was discovered in Microsoft Windows. Windows TCP/IP stack did not handle memory allocation correctly when processing incoming malformed ICMPv6 packets, which could cause remote denial of service.
upvoted 1 times
...
bliix
9 months, 3 weeks ago
Selected Answer: A
The correct answer is A. ICMP header field. The hacker exploit known as the Ping of Death involves manipulating the Internet Control Message Protocol (ICMP) header field in the TCP/IP protocol stack. ICMP is used for diagnostic and error-reporting purposes in IP networks. The Ping of Death attack involves sending an oversized or malformed ICMP packet to a target device, causing it to crash or become unresponsive. Therefore, the ICMP header field (option A) is the header field in the TCP/IP protocol stack that is associated with the Ping of Death exploit.
upvoted 1 times
...
redmonkeyprism
10 months, 1 week ago
Selected Answer: A
Ping is handled via ICMP, not TCP or UDP.
upvoted 1 times
...
vcloudpmp
2 years, 1 month ago
A ping of death is a type of attack on a computer system that involves sending a malformed or otherwise malicious ping to a computer. A correctly formed ping packet is typically 56 bytes in size, or 64 bytes when the ICMP header is considered, and 84 bytes including Internet Protocol version 4 header. However, any IPv4 packet (including pings) may be as large as 65,535 bytes. Some computer systems were never designed to properly handle a ping packet larger than the maximum packet size because it violates the Internet Protocol.
upvoted 2 times
...
K3nz0420
2 years, 1 month ago
Agreed ICMP header should be the answer
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...