QuestionMay 27, 2025

Users are reporting a server responding slowly in what sounds like a high network load, but overall traffic to the server isn't high enough to explain the problem What evidence can you look for in that traffic to find out if it's a network DoS attack?Choose all that apply. Excessive ICMP ping packets Excessive SYN packets Malformed packets Replay packets VLAN hopping

Users are reporting a server responding slowly in what sounds like a high network load, but overall traffic to the server isn't high enough to explain the problem What evidence can you look for in that traffic to find out if it's a network DoS attack?Choose all that apply. Excessive ICMP ping packets Excessive SYN packets Malformed packets Replay packets VLAN hopping
Users are reporting a server responding slowly in what sounds like a
high network load, but overall traffic to the server isn't high enough to
explain the problem What evidence can you look for in that traffic to
find out if it's a network DoS attack?Choose all that apply.
Excessive ICMP ping packets
Excessive SYN packets
Malformed packets
Replay packets
VLAN hopping

Solution
4.5(182 votes)

Answer

Excessive ICMP ping packets, Excessive SYN packets, Malformed packets, Replay packets Explanation 1. Identify Excessive ICMP Ping Packets Look for a high volume of ICMP echo requests (ping packets) which may indicate a DoS attack. 2. Identify Excessive SYN Packets Check for a large number of SYN packets, which could suggest a SYN flood attack, a type of DoS. 3. Detect Malformed Packets Analyze traffic for malformed packets that might be used to exploit vulnerabilities and disrupt services. 4. Identify Replay Packets Observe if there are repeated packets that could indicate an attempt to overwhelm the server.

Explanation

1. Identify Excessive ICMP Ping Packets<br /> Look for a high volume of ICMP echo requests (ping packets) which may indicate a DoS attack.<br /><br />2. Identify Excessive SYN Packets<br /> Check for a large number of SYN packets, which could suggest a SYN flood attack, a type of DoS.<br /><br />3. Detect Malformed Packets<br /> Analyze traffic for malformed packets that might be used to exploit vulnerabilities and disrupt services.<br /><br />4. Identify Replay Packets<br /> Observe if there are repeated packets that could indicate an attempt to overwhelm the server.
Click to rate: