Which one of the following network attacks takes advantages of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?

A.
Teardrop
B.
Smurf
C.
Ping of Death
D.
SYN flood
E.
SNMP Attack
You must be logged in to post a comment.
I choose