Which of the following network attacks takes advantage of weaknesses in the fragment
reassembly functionality of the TCP/IP protocol stack?

A.
Teardrop
B.
SYN flood
C.
Smurf attack
D.
Ping of death
You must be logged in to post a comment.
option A is the Ans.