FUNDAMENTALS OF COMPUTER

TELECOMMUNICATIONS SYSTEMS

COMMUNICATION WIRELESS COMPUTING DEVICES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following elements is most likely to be an issue for Ping flood?
A
Confidentiality
B
Integrity
C
Availability
D
Non-repudiation.
Explanation: 

Detailed explanation-1: -Ping flood, also known as ICMP flood, is a common Denial of Service (DoS) attack in which an attacker takes down a victim’s computer by overwhelming it with ICMP echo requests, also known as pings.

Detailed explanation-2: -Training ground for other attacks The lone purpose of a DDoS attack is to overwhelm the victim with ICMP echo request (ping) packets. For testing purposes, a blind ping flood attack involves using an external program to reveal the IP address of the target computer or local router before executing an attack.

Detailed explanation-3: -An Internet Control Message Protocol (ICMP) flood DDoS attack, also known as a Ping flood attack, is a common Denial-of-Service (DoS) attack in which an attacker attempts to overwhelm a targeted device with ICMP echo-requests (pings).

Detailed explanation-4: -An Internet Control Message Protocol (ICMP) flood attack is a common distributed denial-of-service (DDoS) attack where malicious actors try to overwhelm a server or network device with ICMP pings, or echo-request packets. Typically, ICMP pings are used to determine the health of a device and the connection to it.

There is 1 question to complete.