Which of the following network attacks takes advantage of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?

Which of the following network attacks takes advantage of weaknesses in the fragment
reassembly functionality of the TCP/IP protocol stack?

Which of the following network attacks takes advantage of weaknesses in the fragment
reassembly functionality of the TCP/IP protocol stack?

A.
Teardrop

B.
SYN flood

C.
Smurf attack

D.
Ping of death



Leave a Reply 2

Your email address will not be published. Required fields are marked *


Joshua Dreifreund

Joshua Dreifreund

Ping of death can use also fragmentation, but the actual weakness is in handling oversized ICMP packets. Teardrop is exploits a specific weakness in the reassembly of overlapping fragments.

A is the best answer.