Which one of the following network attacks takes advantages of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?
A.
Teardrop
B.
Smurf
C.
Ping of Death
D.
SYN flood
E.
SNMP Attack
Which one of the following network attacks takes advantages of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?
Which one of the following network attacks takes advantages of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?
A.
Teardrop
B.
Smurf
C.
Ping of Death
D.
SYN flood
E.
SNMP Attack
I choose