ECCouncil Exam Questions

Which one of the following network attacks takes advantages of weaknesses in the fragment reassembly

Which one of the following network attacks takes advantages of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?

A.
Teardrop

B.
Smurf

C.
Ping of Death

D.
SYN flood

E.
SNMP Attack