312-50v12 Exam QuestionsBrowse all questions from this exam

312-50v12 Exam - Question 131


A large enterprise has been experiencing sporadic system crashes and instability, resulting in limited access to its web services. The security team suspects it could be a result of a Denial of Service (DoS) attack. A significant increase in traffic was noticed in the network logs, with patterns suggesting packet sizes exceeding the prescribed size limit. Which among the following DoS attack techniques best describes this scenario?

Show Answer
Correct Answer: BD

A Ping of Death attack involves sending malicious packets that exceed the maximum allowable size defined by network protocols. This causes the target system to crash, freeze, or destabilize. Given the situation where the network logs indicate packet sizes exceeding the prescribed limit, this matches the characteristics of a Ping of Death attack.

Discussion

4 comments
Sign in to comment
smoceOption: D
Feb 5, 2024

A Ping of Death (PoD) attack is a form of DDoS attack in which an attacker sends the recipient device simple ping requests as fragmented IP packets that are oversized or malformed.

insaniuntOption: D
Feb 9, 2024

D - Ping of Death Module 10 Page 1441 from CEH v12 book

insaniunt
Feb 9, 2024

In a Ping of Death (PoD) attack, an attacker attempts to crash, destabilize, or freeze the target system or service by sending malformed or oversized packets using a simple ping command. Suppose an attacker sends a packet with a size of 65,538 bytes to the target web server. This size exceeds the size limit prescribed by RFC 791 IP, which is 65,535 bytes. The reassembly process performed by the receiving system might cause the system to crash. In such attacks, the attacker’s identity can be easily spoofed, and the attacker might not need detailed knowledge of the target machine, except its IP address.

[Removed]
Feb 10, 2024

Could someone please validate this information

remreyOption: D
Jul 5, 2024

Answer: D Smurf attacks involve amplifying network traffic to overwhelm a target, using spoofed broadcast ping messages, while Ping of Death attacks focus on exploiting packet size vulnerabilities to cause system failures.