New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CSSLP Exam - Topic 5 Question 105 Discussion

Actual exam question for ISC2's CSSLP exam
Question #: 105
Topic #: 5
[All CSSLP Questions]

Samantha works as an Ethical Hacker for we-are-secure Inc. She wants to test the security of the we-are-secure server for DoS attacks. She

sends large number of ICMP ECHO packets to the target computer. Which of the following DoS attacking techniques will she use to accomplish

the task?

Show Suggested Answer Hide Answer
Suggested Answer: C

According to the scenario, Samantha is using the ping flood attack. In a ping flood attack, an attacker sends a large number of ICMP packets

to the target computer using the ping command, i.e., ping -f target_IP_address. When the target computer receives these packets in large

quantities, it does not respond and hangs. However, for such an attack to take place, the attacker must have sufficient Internet bandwidth,

because if the target responds with an 'ECHO reply ICMP packet' message, the attacker must have both the incoming and outgoing

bandwidths available for communication.

Answer A is incorrect. In a smurf DoS attack, an attacker sends a large amount of ICMP echo request traffic to the IP broadcast

addresses. These ICMP requests have a spoofed source address of the intended victim. If the routing device delivering traffic to those

broadcast addresses delivers the IP broadcast to all the hosts, most of the IP addresses send an ECHO reply message. However, on a multi-

access broadcast network, hundreds of computers might reply to each packet when the target network is overwhelmed by all the messages

sent simultaneously. Due to this, the network becomes unable to provide services to all the messages and crashes.

Answer D is incorrect. In a teardrop attack, a series of data packets are sent to the target computer with overlapping offset field

values. As a result, the target computer is unable to reassemble these packets and is forced to crash, hang, or reboot.

Answer B is incorrect. In a land attack, the attacker sends a spoofed TCP SYN packet in which the IP address of the target is filled in

both the source and destination fields. On receiving the spoofed packet, the target system becomes confused and goes into a frozen state.

Now-a-days, antivirus can easily detect such an attack.


Contribute your Thoughts:

0/2000 characters
Hyun
2 months ago
Land attack is outdated, right?
upvoted 0 times
...
Laura
2 months ago
I think it's a Smurf attack, not sure though.
upvoted 0 times
...
Kanisha
2 months ago
Definitely a Ping flood attack!
upvoted 0 times
...
Susana
3 months ago
Yeah, Ping flood is the classic method.
upvoted 0 times
...
Cherry
3 months ago
Wait, can she really just send ICMP packets like that? Seems risky!
upvoted 0 times
...
Shantay
3 months ago
I feel like the Land attack is more about exploiting a vulnerability rather than just flooding with packets, but I could be wrong.
upvoted 0 times
...
Aileen
3 months ago
I practiced a similar question, and I think the Ping flood is the most straightforward answer here.
upvoted 0 times
...
Robt
4 months ago
I'm not entirely sure, but I remember something about the Smurf attack also using ICMP packets.
upvoted 0 times
...
Louann
4 months ago
I think this might be related to the Ping flood attack since it involves sending a lot of ICMP packets.
upvoted 0 times
...
Rasheeda
4 months ago
The key here is that Samantha is using ICMP ECHO packets, so the Ping Flood attack seems like the most straightforward answer. I'd recommend double-checking the other options, but I think C is the way to go.
upvoted 0 times
...
Lashawn
4 months ago
I'm a little confused by the wording of this question. Is the Smurf attack a valid option here, or is it just the Ping Flood? I want to make sure I understand the differences between these DoS techniques before answering.
upvoted 0 times
...
Kami
4 months ago
Okay, let's see. Sending a large number of ICMP ECHO packets to a target computer - that sounds like a Ping Flood to me. I'm going to go with option C on this one.
upvoted 0 times
...
Matilda
4 months ago
Hmm, I'm a bit unsure about this one. The question mentions ICMP ECHO packets, so I'm thinking it could be a Smurf attack as well. I'll have to think this through carefully.
upvoted 0 times
...
Markus
5 months ago
This looks like a classic Ping Flood attack. I'm pretty confident that's the right answer here.
upvoted 0 times
...
Kallie
5 months ago
I think Land attack might be too risky, so Ping flood attack or Smurf dos attack would be safer choices.
upvoted 0 times
...
Veronika
5 months ago
Hmm, I'm not sure if Smurf attack is the right answer here. Doesn't that require spoofing the source IP? This seems more like a simple ping flood.
upvoted 0 times
...
Yvette
5 months ago
I believe Smurf dos attack could also be a potential option for Samantha to use in this scenario.
upvoted 0 times
...
Ressie
5 months ago
I agree with Sharika, Ping flood attack seems like the right choice for testing DoS attacks.
upvoted 0 times
...
Helga
6 months ago
Wow, this is a classic ICMP ECHO packet DoS attack. I'm pretty sure the answer is C) Ping flood attack.
upvoted 0 times
Alecia
5 months ago
I think you're right, C) Ping flood attack is the correct choice.
upvoted 0 times
...
...
Sharika
6 months ago
I think Samantha will use Ping flood attack.
upvoted 0 times
...

Save Cancel