Spring Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ac4s65

During a penetration test at a healthcare provider in Phoenix, ethical hacker Sofia crafts a...

During a penetration test at a healthcare provider in Phoenix, ethical hacker Sofia crafts a stream of IP packets with manipulated offset fields and overlapping payload offsets so that the records server's protocol stack repeatedly attempts to reconstruct the original datagrams. The repeated reconstruction attempts consume CPU and memory, causing the system to crash intermittently and disrupt patient portal access, even though overall bandwidth remains normal. Packet analysis shows deliberately malformed offsets that trigger processing errors rather than a simple flood of traffic.

Which type of attack is Sofia most likely simulating?

A.

Fragmentation Attack

B.

ICMP Flood

C.

Teardrop Attack

D.

Ping of Death

312-50v13 PDF/Engine
  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions
buy now 312-50v13 pdf
Get 65% Discount on All Products, Use Coupon: "ac4s65"