Which one of the following network attacks takes advantages of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?
Which of the following techniques can she use to gather information from the switched network or to disable some of the traffic isolation features of the switch?