Which one of the following network attacks takes advantages of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?

Which one of the following network attacks takes advantages of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?

Which one of the following network attacks takes advantages of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?

A.
Teardrop

B.
Smurf

C.
Ping of Death

D.
SYN flood

E.
SNMP Attack



Leave a Reply 1

Your email address will not be published. Required fields are marked *


seenagape

seenagape

I choose