Which of the following network attacks takes advantage of weaknesses in the fragment
reassembly functionality of the TCP/IP protocol stack?
A.
Teardrop
B.
SYN flood
C.
Smurf attack
D.
Ping of death
Which of the following network attacks takes advantage of weaknesses in the fragment
reassembly functionality of the TCP/IP protocol stack?
Which of the following network attacks takes advantage of weaknesses in the fragment
reassembly functionality of the TCP/IP protocol stack?
A.
Teardrop
B.
SYN flood
C.
Smurf attack
D.
Ping of death
A
Ping of death can use also fragmentation, but the actual weakness is in handling oversized ICMP packets. Teardrop is exploits a specific weakness in the reassembly of overlapping fragments.
A is the best answer.