EC-Council: Computer Hacking Forensic Investigator(CHFI-V10)
Module 8 : Network Forensics
         
Questions available : 133 You are not logged in.
Please Login for track your learning progress
   
 
Q. No: 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 |
Go to Question No.



Question No 0


If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
 

   
Bookmark this Question
QID: 487  
   
What header field in the TCP/IP protocol stack involves the hacker exploit known as the Ping of Death?


 
A:    ICMP header field
 
B:    TCP header field
C:    IP header field
 
D:    UDP header field
 
         

 
 

Diffence opinion in Correct Answer or any comment?
Vote / Comment for correct Answer



Comunity Comments:

Pradeep Thomas on 08/05/2024
Opted Answer: A
The Ping of Death attack involves exploiting the ICMP protocol and IP fragmentation. Here’s a quick overview of how it works:

The attacker sends an ICMP (ping) packet that is larger than the maximum allowed size of 65,535 bytes.
This oversized packet gets fragmented into multiple, smaller packets by the attacker’s system before sending.
The receiving system tries to reassemble these fragments back into the larger packet.
The reassembly process fails because the packet exceeds the maximum size, causing the system to crash or freeze.

















WELCOME TO ONLINE EXAM PREPARATION SYSTEM

Certification Examinations