Which two behavioral patterns characterize a ping of death attack? (Choose two)
Answer(s): B,D
Ping of Death (PoD) is a type of Denial of Service (DoS) attack in which an attacker attempts to crash, destabilize, or freeze the targeted computer or service by sending malformed or oversized packets using a simple ping command.A correctly-formed ping packet is typically 56 bytes in size, or 64 bytes when the ICMP header is considered, and 84 including Internet Protocol version 4 header. However, any IPv4 packet (including pings) may be as large as 65,535 bytes. Some computer systems were never designed to properly handle a ping packet larger than the maximum packet size because it violates the Internet Protocol documented Like other large but well-formed packets, a ping of death is fragmented into groups of 8 octets before transmission. However, when the target computer reassembles the malformed packet, a buffer overflow can occur, causing a system crash and potentially allowing the injection of malicious code.
Which two preventive measures are used to control cross-site scripting? (Choose two)
Answer(s): A,B
What is the difference between deceptive phishing and spear phishing?
Answer(s): B
In deceptive phishing, fraudsters impersonate a legitimate company in an attempt to steal people's personal data or login credentials. Those emails frequently use threats and a sense of urgency to scare users into doing what the attackers want.Spear phishing is carefully designed to get a single recipient to respond. Criminals select an individual target within an organization, using social media and other public information and craft a fake email tailored for that person.
Which attack is commonly associated with C and C++ programming languages?
Answer(s): D
A buffer overflow (or buffer overrun) occurs when the volume of data exceeds the storage capacity of the memory buffer. As a result, the program attempting to write the data to the buffer overwrites adjacent memory locations.Buffer overflow is a vulnerability in low level codes of C and C++. An attacker can cause the program to crash, make data corrupt, steal some private information or run his/her own code. It basically means to access any buffer outside of it's alloted memory space. This happens quite frequently in the case of arrays.
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?
Answer(s): A
TAXII (Trusted Automated Exchange of Indicator Information) is a standard that provides a transport
Post your Comments and Discuss Cisco 350-701 exam dumps with other Community members: