ECCouncil Exam Questions

Which of the following network attacks takes advantage of weaknesses in the fragment reassembly func

Which of the following network attacks takes advantage of weaknesses in the fragment
reassembly functionality of the TCP/IP protocol stack?

A.
Teardrop

B.
SYN flood

C.
Smurf attack

D.
Ping of death