Which of the following network attacks takes advantage of weaknesses in the fragment
reassembly functionality of the TCP/IP protocol stack?
![PrepAway - Latest Free Exam Questions & Answers](https://www.briefmenow.org/img/pa5.jpg)
A.
Teardrop
B.
SYN flood
C.
Smurf attack
D.
Ping of death
You must be logged in to post a comment.
option A is the Ans.