ECCouncil Exam Questions

Which of the following network attacks takes advantage …

Which of the following network attacks takes advantage of weaknesses in the fragment reassembly
functionality of the TCP/IP protocol stack?

A.
Teardrop

B.
SYN flood

C.
Smurf attack

D.
Ping of death