Which two behavioral patterns characterize a ping of death attack? (Choose two)
Answer(s): B,D
Ping of Death (PoD) is a type of Denial of Service (DoS) attack in which an attacker attempts to crash, destabilize, or freeze the targeted computer or service by sending malformed or oversized packets using a simple ping command.A correctly-formed ping packet is typically 56 bytes in size, or 64 bytes when the ICMP header is considered, and 84 including Internet Protocol version 4 header. However, any IPv4 packet (including pings) may be as large as 65,535 bytes. Some computer systems were never designed to properly handle a ping packet larger than the maximum packet size because it violates the Internet Protocol documented Like other large but well-formed packets, a ping of death is fragmented into groups of 8 octets before transmission. However, when the target computer reassembles the malformed packet, a buffer overflow can occur, causing a system crash and potentially allowing the injection of malicious code.
Which two preventive measures are used to control cross-site scripting? (Choose two)
Answer(s): A,B
What is the difference between deceptive phishing and spear phishing?
Answer(s): B
In deceptive phishing, fraudsters impersonate a legitimate company in an attempt to steal people's personal data or login credentials. Those emails frequently use threats and a sense of urgency to scare users into doing what the attackers want.Spear phishing is carefully designed to get a single recipient to respond. Criminals select an individual target within an organization, using social media and other public information and craft a fake email tailored for that person.
Which attack is commonly associated with C and C++ programming languages?
Answer(s): D
A buffer overflow (or buffer overrun) occurs when the volume of data exceeds the storage capacity of the memory buffer. As a result, the program attempting to write the data to the buffer overwrites adjacent memory locations.Buffer overflow is a vulnerability in low level codes of C and C++. An attacker can cause the program to crash, make data corrupt, steal some private information or run his/her own code. It basically means to access any buffer outside of it's alloted memory space. This happens quite frequently in the case of arrays.
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?
Answer(s): A
TAXII (Trusted Automated Exchange of Indicator Information) is a standard that provides a transport
Post your Comments and Discuss Cisco 350-701 exam dumps with other Community members:
Casper Commented on March 02, 2026 q219 and q 220 the same Anonymous
Mikser Commented on February 27, 2026 Question 26 and 36 are not correct shows Anonymous
saira Commented on September 05, 2025 great quality Anonymous
DEVENDRA Commented on September 04, 2025 HOW CAN I USE Simulator software (.EXM) FOR pRACTICE UNITED STATES
sac Commented on August 07, 2025 reveiew q 36 UNITED STATES
Sasco Commented on July 31, 2025 This site is accurate UNITED STATES
Phany Commented on July 07, 2025 A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on host Should be the same on hostB POLAND
Phany Commented on July 07, 2025 Really usefull POLAND
Anonymous Commented on May 12, 2025 Q130 the correct answer is aaa new-model. This command enable AAA UNITED STATES
David A Commented on January 16, 2024 Good Colombia Anonymous
Kim Commented on May 25, 2023 I just purchased and downloaded my files. Everything looks good so far. UNITED STATES