Which one of the following network attacks takes advantages of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?

Which one of the following network attacks takes advantages of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?

Which one of the following network attacks takes advantages of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?

A.
Teardrop

B.
Smurf

C.
Ping of Death

D.
SYN flood

E.
SNMP Attack

Explanation:
The teardrop attack uses overlapping packet fragments to confuse a target system and cause the system to reboot or crash.



Leave a Reply 0

Your email address will not be published. Required fields are marked *