What attack is primarily based on the fragmentation implementation of IP and large ICMP packet
size?

A.
Exhaustive
B.
Brute force
C.
Ping of Death
D.
Spoofing
Explanation:
Ping of Death — This exploit is based on the fragmentation implementation of IP whereby large
packets are reassembled and can cause machines to crash. ‘Ping of Death takes advantage of the fact
that it is possible to send an illegal ICMP Echo packet with more than the allowable 65, 507 octets of
data because of the way fragmentation is performed. A temporary fix is block ping packets. Ideally,
an engineer should secure TCP/IP from overflow when reconstructing IP fragments.