Which of the following best describes the Ping of Death exploit correct answer?

Preparing for your Certified Ethical Hacker certification? Assess your knowledge of topics on the CEH exam with these practice test questions.

  • Share this item with your network:

By

  • Sharon Shea, Executive Editor
  • McGraw Hill Education

Matt Walker, author of CEH Certified Ethical Hacker Practice Exams, Fourth Edition, published by McGraw Hill, warned readers in the book introduction, "CEH didn't gain the reputation and value it has by being easy to attain."

The EC-Council's CEH is on the Department of Defense's list of certifications suitable for Directive 8570 under DoDD 8140, which mandates certification for government employees who conduct information assurance tasks. As such, CEH has become one of the top certifications for technicians, Walker wrote.

The four-hour, 125-question "marathon," as Walker called it, puts potential certification holders to the test. But, for those who put their mind to it and do well on the exam, he said it's a meaningful addition to any security pro's skill set, resume and email signature line.

Walker offered another note of caution to test takers, one which he reiterated in a recent interview with SearchSecurity: "If you want to pass this exam and have the respect and benefits that come along with holding the certification, then you damn well better know how to do the job."

Memorization is not your friend, he said. Candidates should take the time to absorb the necessary knowledge to truly get the most possible out of the CEH exam and certification. The practice exam book shouldn't be your first step, either, he added. Networking, finding an infosec mentor and self-studying (Walker's CEH guide is also available from McGraw Hill) are all important steps in the process.

Which of the following best describes the Ping of Death exploit correct answer?
Click to learn more about
this title.

Once you're done studying -- or if you're looking to assess your knowledge before studying to learn which topics you need to focus on a little further -- try your hand at these practice CEH questions taken from Chapter 10 of Walker's book. Download a copy of Chapter 10 for more questions.

Which of the following best describes the Ping of Death exploit correct answer?
Share

  • facebook
    Which of the following best describes the Ping of Death exploit correct answer?
  • linkedin
    Which of the following best describes the Ping of Death exploit correct answer?

3min. read

What is a denial of service attack (DoS) ?

 

A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash. In both instances, the DoS attack deprives legitimate users (i.e. employees, members, or account holders) of the service or resource they expected.

Victims of DoS attacks often target web servers of high-profile organizations such as banking, commerce, and media companies, or government and trade organizations. Though DoS attacks do not typically result in the theft or loss of significant information or other assets, they can cost the victim a great deal of time and money to handle.

There are two general methods of DoS attacks: flooding services or crashing services. Flood attacks occur when the system receives too much traffic for the server to buffer, causing them to slow down and eventually stop. Popular flood attacks include:

  • Buffer overflow attacks – the most common DoS attack. The concept is to send more traffic to a network address than the programmers have built the system to handle. It includes the attacks listed below, in addition to others that are designed to exploit bugs specific to certain applications or networks
  • ICMP flood – leverages misconfigured network devices by sending spoofed packets that ping every computer on the targeted network, instead of just one specific machine. The network is then triggered to amplify the traffic. This attack is also known as the smurf attack or ping of death.
  • SYN flood – sends a request to connect to a server, but never completes the handshake. Continues until all open ports are saturated with requests and none are available for legitimate users to connect to.

Other DoS attacks simply exploit vulnerabilities that cause the target system or service to crash. In these attacks, input is sent that takes advantage of bugs in the target that subsequently crash or severely destabilize the system, so that it can’t be accessed or used.

An additional type of DoS attack is the Distributed Denial of Service (DDoS) attack. A DDoS attack occurs when multiple systems orchestrate a synchronized DoS attack to a single target. The essential difference is that instead of being attacked from one location, the target is attacked from many locations at once. The distribution of hosts that defines a DDoS provide the attacker multiple advantages:

  • He can leverage the greater volume of machine to execute a seriously disruptive attack
  • The location of the attack is difficult to detect due to the random distribution of attacking systems (often worldwide)
  • It is more difficult to shut down multiple machines than one
  • The true attacking party is very difficult to identify, as they are disguised behind many (mostly compromised) systems

Modern security technologies have developed mechanisms to defend against most forms of DoS attacks, but due to the unique characteristics of DDoS, it is still regarded as an elevated threat and is of higher concern to organizations that fear being targeted by such an attack.

What type of attack is the ping of death quizlet?

The ping of death (also called a long ICMP attack) is a DoS attack that uses the ping program to send oversized ICMP packets. A Smurf attack is a form of DRDoS attack that spoofs the source address in ICMP packets and requires an attacker system, an amplification network, and a victim computer or network.

What security mechanism can be used to detect attacks originating on the Internet?

A signature-based intrusion detection system (SIDS) monitors all the packets traversing the network and compares them against a database of attack signatures or attributes of known malicious threats, much like antivirus software.

Which trait differentiates a DoS attack from a DDoS attack quizlet?

The difference between a denial-of-service (DoS) attack and a distributed denial-of-service (DDoS) attack is the number of systems being used in the attack. A DoS attack is potentially more dangerous and devastating than DDoS attack because of the size of the attack being launched. You just studied 28 terms!

Which of the following tools would you use to view the MAC addresses associated with IP addresses that the local workstation has contacted recently?

The arp utility will show you the resolved MAC to IP address of all hosts on your network segment.