Which one of the following network attacks takes advantages of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?
A.
Teardrop
B.
Smurf
C.
Ping of Death
D.
SYN flood
E.
SNMP Attack
Explanation:
The teardrop attack uses overlapping packet fragments to confuse a target system and cause the system to reboot or crash.