ECCouncil Exam Questions

Which one of the following network attacks takes advantages of weaknesses in the fragment reassembly

Which one of the following network attacks takes advantages of weaknesses in the fragment
reassembly functionality of the TCP/IP protocol stack?

A.
Teardrop

B.
Smurf

C.
Ping of Death

D.
SYN flood

E.
SNMP Attack

Explanation:
The teardrop attack uses overlapping packet fragments to confuse a target system and cause the
system to reboot or crash.